Trojan - Page 45

Home > Trojan

WHAT IS TROJAN HORSE?

This category provides detailed articles about Trojan attacks, and gives instructions on how to remove spyware, keyloggers, cryptominers (cryptocurrency miners), rootkits, typically spread via Trojan infections. If you suspect having a Trojan infection on your system, refer to our Trojan removal guides.

THREAT REMOVAL
computer-security

How to Remove Worm:Win32/Nuqel.BD

Worm:Win32/Nuqel.BD is a virus capable of corrupting your system by slowing it down, adding and deleting files, tracking your browsing routine and even stealing your personal data. Is Worm:Win32/Nuqel.BD Dangerous? Yes. And here’s why: Worm:Win32/Nuqel.BD belongs to Worm:Win32/Nuqel family and…

THREAT REMOVAL
Redirect Virus

Db101.exe Removal Manual

Most AV engines report db101.exe as a malicious file, part of a Trojan infection that can download and install adware or other potentially harmful programs on the affected computer. db101.exe is detected as Trj/Genetic.gen, Downloader.Generic14.HTD, Gen:Variant.FakeAV.120, Adware/Win32.AdPeak. The malicious program…

THREAT REMOVAL
db29-exe-file

Remove db29.exe to Protect Your System and Sensitive Data

db29.exe is just another piece of malware categorized as a Trojan designed to sneak into your system and download additional malware for various reasons. What Is db29.exe? db29.exe acts like a typical Trojan – it serves as a backdoor for…

THREAT REMOVAL
Weelsof Ransomware

Remove Nimisi from Your PC

Today we’d like to introduce an intriguing piece of malware called Nimisi – a Trojan specifically designed to steal your sensitive data once it’s comfortably crept into your system. What Does Nimisi Do? What makes Nimisi an intriguing Trojan is…

THREAT REMOVAL
windows-fix

Windows Fix Removal Manual

Windows Fix is a rogue diagnostic program that uses a typical scamware strategy – Windows Fix performs a fake system scan and displays misleading security notifications about nonexistent threats on the affected machine. The victims are invited to rely on…

THREAT REMOVAL
what-is-sirius-win-8-protection-2014

Windows Repair Removal Manual

Windows Repair is a rogue application that adopts visual elements and certain malicious features from other well-known threats. Windows Repair performs a scan of the compromised machine and displays security notifications informing the user that his computer is infected with…

THREAT REMOVAL
pc

What Is Antivirus Defender 2015?

Antivirus Defender 2015 is a rogue anti-malware program that mocks the real anti-virus program Bitdefender Antivirus Plus 2015 in order to trick you into purchasing its full version. Antivirus Defender 2015 is no different than most rogue anti-spyware programs. Once…

THREAT REMOVAL
DropDrans

Remove DropDrans from Your Computer

DropDrans is detected and classified as a Trojan downloader as an initial stage of a cyber-attack. DropDrans is employed by hackers to download and install different malware from designated web locations and remote servers. This way the cyber criminals can…

THREAT REMOVAL
Trojan.Zbot Activity 15

Remove Trojan.Win32.Buzus.wdvx Immediately

Trojan.Win32.Buzus.wdvx is a Trojan dropper designed to compromise computers’ security systems and violate victims’ privacy. It serves as a backdoor for other malware to infect your system. How Does Trojan.Win32.Buzus.wdvx Affect Your PC? You know you have been infected by…

THREAT REMOVAL
CleanScan-Removal

CleanScan Removal Manual

What Is CleanScan? Experts classify CleanScan (or Clean Scan) as a rogue anti-spyware program that only aims to generate profit to its creators. Distributed to the victim’s computer via Trojans, CleanScan will create a start-up registry entry and modify the…

THREAT REMOVAL
Trojan.Zbot Activity 15

Remove Trojan.Zbot Activity 15 from Your Computer Permanently

Created via a Trojan-building toolkit, Trojan.Zbot Activity 15 works as a backdoor Trojan Horse, specifically designed to steal sensitive data from its victim. How Does Trojan.Zbot Activity 15 Work? Once it infects your computer, Trojan.Zbot Activity 15 acts like a…

THREAT REMOVAL
worm-removal

Remove Net-Worm.Win32.Kido.ih from Your PC

A variant of Net-Worm.Win32.Kido computer worm, Net-Worm.Win32.Kido.ih is being spread through removable storage devices or local networks. As soon as Net-Worm.Win32.Kido.ih is activated on a computer, it will copy itself to remote PCs and create a temporary file that has…

THREAT REMOVAL
Ad.Yieldmanager-removal

Ad.yieldmanager.com Removal Manual

Ad.yieldmanager.com (yieldmanager.com, adyieldmanager.com) is a tracking cookie created to collect information about the user’s browsing activities online, such as IP address, browser type, how many times a certain web page has been visited by the user or how long did…

THREAT REMOVAL
dnschanger-removal

Remove DNS Changer from Your Computer

DNS Changer is a Trojan trying to alter the DNS settings on the compromised machine in order to serve malicious purposes. Personal information theft and browser hijacks are often part of the DNS Changer attacks. Experts report that banker Trojans,…

THREAT REMOVAL
errorfix-removal-manual

ErrorFix Removal Manual

Security experts categorize ErrorFix as a rogue registry repair tool that misleads PC users with fake warnings and security notifications so they would purchase the full version of the program. ErrorFIx is promoted as a legit security application for Windows…

THREAT REMOVAL
Random Audio Ads Virus

Remove Random Audio Ads Virus from Your Computer

Random Audio Ads Virus is a general term used to describe different types of adware, Trojans and other computer threats, which initiate audio advertisements automatically. The Audio Ads Virus can be not only quite intrusive, but they can also be…

THREAT REMOVAL
trojan

Remove Trojan:Win32/Croject.E!dll from Your Computer

As the name of the threat suggests, Trojan:Win32/Croject.E!dll is a Trojan that is usually distributed to the victim’s computer through spam emails containing malicious attachments. The corrupted message is designed to lure the user into opening it, and thus trigger…

THREAT REMOVAL
Infostealer.Gampass trojan

Detect and Remove Infostealer.Gampass

What Is Infostealer.Gampass? Infostealer.Gampass is a Trojan that is capable of lowering the security settings of the affected machine, allowing numerous infections to enter the computer. Infostealer.Gampass is specially designed to open a backdoor on the PC, which allows the…

THREAT REMOVAL
digitalprotection

Digital Protection Malware Removal Guide

Digital Protection Does Not Protect – It Infects Digital Protection is a rogue anti-malware program designed to display fake security alert messages on your screen solely to trick you into purchasing its full version. What Does Digital Protection Do to…

THREAT REMOVAL
Background Host

Remove Background Host from Your Computer

Background Host is known to manipulate browser extensions. The malicious code is capable of crashing the ‘backgroundhost64.exe’ process and related security extensions, so it would redirect the search operations performed on the compromised machine. Background Host can also disrupt the…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree