Nuke.Crow Trojan

Nuke.Crow virus description
Technical details:
Categories: Trojan,Hacker Tool
Nuke.Crow Aliases:
[Kaspersky]Nuker.Crow,Nuker.Win32.Miar.102;
[McAfee]Nuke-Crow,Nuke-Miar;
[F-Prot]destructive program,security risk or a "backdoor" program;
[Panda]Nuker/Miar.102,Trj/Crow;
[Computer Associates]Win/MircNuker!Trojan,Win32.Nuker.Crow,Win32/Nuker.Crow!PWS!Trojan

Nuke.Crow indications of infection

This symptoms of Nuke.Crow detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Track4.com Tracking Cookie
WinSoftWare Adware Symptoms
Vxidl.AUF Trojan Removal instruction
Bat.Guru Trojan Cleaner
Ehg.mccormick.hitbox Tracking Cookie Symptoms

Nuke.it Trojan

Nuke.it virus description
Technical details:
Categories: Trojan,Hacker Tool,DoS
Nuke.it Aliases:
[Kaspersky]Flooder.Win32.Daniel,Nuker.Nukit;
[McAfee]Nuke-Nukeit.gen;
[F-Prot]destructive program;
[Panda]Flooder Program,Trj/NukeIt;
[Computer Associates]Win32/NukeIt!Trojan

Nuke.it indications of infection

This symptoms of Nuke.it detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
LoudMarketing Adware Symptoms

naturaloceanart.com Tracking Cookie

naturaloceanart.com virus description
Technical details:
Categories: Tracking Cookie

naturaloceanart.com indications of infection

This symptoms of naturaloceanart.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pounder DoS Removal
Removing Win.Wormtroj Trojan
Vxidl.ASB Trojan Removal

ZeroDl Trojan

ZeroDl virus description
Technical details:
Categories: Trojan

ZeroDl indications of infection

This symptoms of ZeroDl detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.Glu Trojan Symptoms
Remote.Denial.of.Service.for.CProxy.v3.Service.Pack DoS Removal instruction
ClearSearch.csie Hijacker Removal
Removing Pigeon.ESZ Trojan
Remove Transcout Backdoor

CTXPopup Adware

CTXPopup virus description
Technical details:
Categories: Adware

CTXPopup Files:
[%SYSTEM%]\ctxpopup.dll
[%SYSTEM%]\ctxpopup.dll

CTXPopup Registry Keys:
HKEY_CLASSES_ROOT\appid\ctxpopup.dll
HKEY_CLASSES_ROOT\appid\{3857b9cb-de72-4c97-9125-2dd460fb572a}
HKEY_CLASSES_ROOT\interface\{f461798e-c228-41d4-b6e4-01c3b158584b}
HKEY_CLASSES_ROOT\typelib\{3857b9cb-de72-4c97-9125-2dd460fb572a}
HKEY_CLASSES_ROOT\clsid\{5d647e9c-6b37-4636-9a78-dadb1eb93bdf}
HKEY_CLASSES_ROOT\ctxpopup.ieobject
HKEY_CLASSES_ROOT\ctxpopup.ieobject.1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{5d647e9c-6b37-4636-9a78-dadb1eb93bdf}


CTXPopup indications of infection

This symptoms of CTXPopup detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Friday.the.13th Trojan
Removing Darklord Trojan
Kitten.Free.Sex Adware Cleaner

Reporter Backdoor

Reporter virus description
Technical details:
Categories: Backdoor,RAT

Reporter indications of infection

This symptoms of Reporter detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Formicbot Trojan
CWS.Vrape Hijacker Information
Removing Win32.Messah Trojan

Sysad Backdoor

Sysad virus description
Technical details:
Categories: Backdoor

Sysad indications of infection

This symptoms of Sysad detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Agent.jt Downloader
Crystalys.Media Toolbar Removal
Removing SATAN Trojan
SillyDl.AWW Downloader Symptoms

PSW.Capwin Trojan

PSW.Capwin virus description
Technical details:
Categories: Trojan

PSW.Capwin indications of infection

This symptoms of PSW.Capwin detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Win32.PWS.Radar Trojan
Remove Stream2 DoS
Removing IRC.Nuking.in.Win95.Without.Trumpet.Winsock Hacker Tool

Moonpie.30b RAT

Moonpie.30b virus description
Technical details:
Categories: RAT

Moonpie.30b indications of infection

This symptoms of Moonpie.30b detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove VBS.Solow.C Worm
IRC.Kelebek Trojan Removal
AI Trojan Symptoms
Removing AVJM Trojan
Cvex3 Trojan Symptoms

SULFNBK Hoax

SULFNBK virus description
Technical details:
Categories: Hoax

SULFNBK indications of infection

This symptoms of SULFNBK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AVSB Trojan Symptoms
Win32.WebDav Trojan Removal instruction
SillyDl.CVW Trojan Removal instruction
Remove AOL.Password.Stealing Trojan
Remove VB.mo Trojan

Skrat Trojan

Skrat virus description
Technical details:
Categories: Trojan

Skrat indications of infection

This symptoms of Skrat detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.CUJ Trojan Removal instruction
Pigeon.EDV Trojan Removal instruction

Evil.AIM.SN.Maker Trojan

Evil.AIM.SN.Maker virus description
Technical details:
Categories: Trojan

Evil.AIM.SN.Maker indications of infection

This symptoms of Evil.AIM.SN.Maker detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing SillyDl.DNU Trojan
Rotate Trojan Cleaner
Evil.Goar RAT Removal

RemoteExplorer2000 Trojan

RemoteExplorer2000 virus description
Technical details:
Categories: Trojan,Backdoor

RemoteExplorer2000 indications of infection

This symptoms of RemoteExplorer2000 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Delf.al Trojan Symptoms
Bancos.IHE Trojan Removal instruction
Bancos.GTA Trojan Symptoms
Pigeon.AMB Trojan Removal
BankAds.com Tracking Cookie Removal instruction

NetOp.Remote.Control RAT

NetOp.Remote.Control virus description
Technical details:
Categories: RAT

NetOp.Remote.Control indications of infection

This symptoms of NetOp.Remote.Control detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Dr.Modem Spyware Information
Remove QuestionMarket.com Tracking Cookie
Remove gold.stealer Trojan
Small.bug Downloader Information

OverSpy Spyware

OverSpy virus description
Technical details:
Categories: Spyware

OverSpy Folders:
[%COMMON_PROGRAMS%]\OverSpy
[%PROGRAMS%]\overspy
[%PROGRAM_FILES%]\overspy

OverSpy Files:
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\OverSpy.lnk
[%DESKTOP%]\OverSpy.lnk
[%SYSTEM%]\sysprocs\overspy help.url
[%SYSTEM%]\sysprocs\overspy.exe
[%SYSTEM%]\sysprocs\overspy.url
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\OverSpy.lnk
[%DESKTOP%]\OverSpy.lnk
[%SYSTEM%]\sysprocs\overspy help.url
[%SYSTEM%]\sysprocs\overspy.exe
[%SYSTEM%]\sysprocs\overspy.url

OverSpy Registry Keys:
HKEY_CLASSES_ROOT\clsid\{0e9d1f65-6417-48e3-ac6f-81dc5f99be4e}
HKEY_CLASSES_ROOT\clsid\{a9d098f3-3fd5-3675-a210-58704085a191}
HKEY_CLASSES_ROOT\doublehook.tshellexecutehook
HKEY_CURRENT_USER\software\virtuoza\overspy
HKEY_LOCAL_MACHINE\software\microsoft\esent\process\overspy
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{ae40eba0-2d49-48c9-ba8d-e9f046240f5f}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{ae40eba0-2d49-48c9-ba8d-e9f046240f5f}}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\overspy_is1

OverSpy Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks


OverSpy indications of infection

This symptoms of OverSpy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove SCN Toolbar
SoftWAR.ShadowThieft RAT Cleaner
April30 Trojan Symptoms

LowZones.cza Trojan

LowZones.cza virus description
Technical details:
Categories: Trojan

LowZones.cza Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\globo
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\globo
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


LowZones.cza indications of infection

This symptoms of LowZones.cza detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
CurePCSolution Adware Cleaner
Easy.Keylogger Spyware Removal
Pigeon.AVHC Trojan Removal instruction
Delfil Trojan Cleaner
Remove Bayrob Trojan

MSN.Toolz Trojan

MSN.Toolz virus description
Technical details:
Categories: Trojan,DoS
MSN.Toolz Aliases:
[Kaspersky]Flooder.MSN.VB.o;
[Panda]Trojan Horse

MSN.Toolz indications of infection

This symptoms of MSN.Toolz detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.INL Trojan Information
Flgobar BHO Cleaner
Removing Zhong Adware

Blueang Trojan

Blueang virus description
Technical details:
Categories: Trojan

Blueang indications of infection

This symptoms of Blueang detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Aladino Trojan Removal instruction
Delf.jq Trojan Removal
Remove Trinoo Trojan

Pigeon.AVVR Trojan

Pigeon.AVVR virus description
Technical details:
Categories: Trojan

Pigeon.AVVR indications of infection

This symptoms of Pigeon.AVVR detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Slavery Trojan
Remove EffectiveBar Adware
Remove LinkSponsor.com Tracking Cookie
PWS.Kcom Trojan Symptoms

tso.co.uk Tracking Cookie

tso.co.uk virus description
Technical details:
Categories: Tracking Cookie

tso.co.uk indications of infection

This symptoms of tso.co.uk detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Kampana Trojan Removal
UltraKeyboard Spyware Information
Vxidl.AZJ Trojan Information
WebSideStory.com Tracking Cookie Symptoms