Trojan - Page 40

Home > Trojan

WHAT IS TROJAN HORSE?

This category provides detailed articles about Trojan attacks, and gives instructions on how to remove spyware, keyloggers, cryptominers (cryptocurrency miners), rootkits, typically spread via Trojan infections. If you suspect having a Trojan infection on your system, refer to our Trojan removal guides.

THREAT REMOVAL

Taskeng.exe Description and Virus Removal

This article aims to help you identify what is taskeng.exe black screen process and how to remove it from your computer effectively and restore all the changes performed by this unwanted process on your PC. A lot of complaints have…

THREAT REMOVAL
warning-trojan

Remove Infostealer.Bebloh and Protect Your PC

A new information theft-type of Trojan has emerged out into the open, going by the name Infostealer.Bebloh. Security experts believe that the trojan is not a high-risk threat, but if a PC is improperly secured it can be utilized in…

THREAT REMOVAL
ransomware

Is WinRAR.exe Infected by Win32/Parite Virus?

In some cases, executable files can be dangerous to the system. Security research indicates that the WinRAR.exe has been infected by malware. Analysis by HerdProtect shows that 45 out of 68 AV solutions detect a virus in the process. Therefore,…

THREAT REMOVAL
blababindi-family

Remove TrojanDownloader:Win32/Bladabindi and Unwanted Software

The Bladabindi malware family is well-known to security researchers. Bladabindi variants can be created via a hacker tool known as NJ Rat. Microsoft has detected the device as VirTool:MSIL/Bladabindi.A. We have already reported one threat of the Bladabindi kind –…

THREAT REMOVAL
gangnamgame.com-virus

Remove Gangnamgame.net Virus Completely From Your PC

A site, going by the name gangnamgame.net is believed to be associated with a computer virus that modifies files on the user PC. The virus is thought to be dangerous and prevent any antivirus programs on the computer to start-up.…

THREAT REMOVAL
trojan

Remove TrojanDownloader:AutoIt/Gedo and Protect Your PC

Trojan horses have affected thousands of users on a global scale. There are different types of Trojan attacks, depending on what information cyber criminals are attempting to steal. Trojan downloaders are quite common among home users. Microsoft has recently detected…

THREAT REMOVAL

Remove VirTool:Win32/Obfuscator.XX and Scan Your PC

User complaints have been registered about a threat dubbed VirTool:Win32/Obfuscator.XX. The VirTool:Win32/Obfuscator.XX may be a false positive triggered by pirated software, or could be employed by malware. To determine the origin of the threat, a full system scan may be…

THREAT REMOVAL
ransomware

Backdoor:MSIL/Bladabindi.AJ Removal from the System

Backdoors are quite damaging to the system and should be removed immediately. Backdoor:MSIL/Bladabindi.AJ is one of the latest backdoors reported by Microsoft. It belongs to the MSIL/Bladabindi family designed to steal sensitive data and send it to hackers. It is…

THREAT REMOVAL
p16_0000

Remove H-worm VBS worm from the System

A Computer worm is a malicious piece of software that should be removed instantly from the infected PC. H-worm falls under the category of VBS (Visual Basic Script) worms. It is also reported to have RAT (remote access Trojan) capabilities…

THREAT REMOVAL
Botnet-example

Shifu Trojan Hits 14 Banks in Japan in a Sophisticated Attack

A Banking Trojan is one of the many types of Trojan Horses. In computer and network safety, a Banking Trojan is any malicious program deployed to obtain confidential information about a bank’s customers and online banking systems. We have observed…

THREAT REMOVAL
p15_0000

HTML/ScrInject.B.Gen – More About and How to Remove

Online security software keeps identifying a threat going by the name of HTML/ScrInject.B.Gen. It is reported to be associated with some websites and many users tend to believe that it is a false positive, i.e. not a real threat due…

THREAT REMOVAL
warning-trojan

Trojan:Win32/Dorv.B!rfn Removal And Description

This particular type of trojan is reported by ESG security researchers to distribute mainly via drive-by downloads in the form of Java or Flash Player updates. It could also be embedded with free software downloaded from unfamiliar third parties. It…

THREAT REMOVAL
p15_0000

Remove SoftwareBundler:Win32/FakeDiX from the PC

SoftwareBundler:Win32/FakeDiX is a suspicious application that compromises the PC’s safety and performance. SoftwareBundler:Win32/FakeDiX is presented as a tool that downloads DirectX. However, it doesn’t. Instead, it creates suspicious .dll files on the system and injects malicious code to prevent detection.…

THREAT REMOVAL
ransomware

CoreBot Trojan Removal and Description

A dangerous malware infection has been detected out in the wild. It is called CoreBot, and it can cause a lot of havoc and headaches to many users. It is focused mainly on stealing information without any restrictions what so…

THREAT REMOVAL
trojan

TrojanDownloader:MSIL/Winpud.A Removal Manual

What Is TrojanDownloader:MSIL/Winpud.A? TrojanDownloader:MSIL/Winpud.A is a really dangerous infection that you do not want on your computer. This is a big threat and can cause all kinds of harm for your system, including stealing all of your important information. You…

THREAT REMOVAL
trojan

Remove TrojanDownloader:AutoIt/Fadef Fully From Your PC

A new type of trojan going by the name of TrojanDownloader:Autoit/Fadef has been reported to infect numerous PCs worldwide. This particular trojan horse is a downloader type, meaning that it modifies individual permissions that allow it to download and install…

THREAT REMOVAL
p16_0000

Antivirus Blocking Rules Removal Instructions

Antivirus Blocking Rules is used by many threats with the sole purpose to bypass cyber security in computers -anti-malware, antivirus, firewalls. Antivirus Blocking Rules may be quite damaging because very dangerous threats employ them without any restriction what so ever.…

THREAT REMOVAL
p16_0000

Remove Suspicious.Cloud Variants from the System

Suspicious.Cloud is an anti-malware technology created in 2010. It is designed to detect malicious software without it (the malware) having to be included in a malware database. Suspicious.Cloud will just go after the features of known malware threats. A Suspicious…

THREAT REMOVAL
warning-trojan

Remove Trojan:Win32/Colisi.F. Detect GoogleUpdate.dll File Infection

Trojan:Win32/Colisi.F is a Trojan horse that has several variants. According to security researchers, the threat can be located in the Google directory of the infected system. The main file of the Trojan most likely is GoogleUpdate.dll. Since the .dll file…

THREAT REMOVAL
p15_0000

Remove SecurityRisk.First4DRM, Sony Rootkit

First4DRM, also known as SecurityRisk.First4DRM is an online threat classified as a rootkit. It was first published back in 2007 by First 4 Internet Ltd., but apparently has been exploited for malicious intentions.The rootkit is designed to hide particular processes,…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree