Trojan - Page 41

Home > Trojan

WHAT IS TROJAN HORSE?

This category provides detailed articles about Trojan attacks, and gives instructions on how to remove spyware, keyloggers, cryptominers (cryptocurrency miners), rootkits, typically spread via Trojan infections. If you suspect having a Trojan infection on your system, refer to our Trojan removal guides.

THREAT REMOVAL
ransomware

Remove wormp2p.tanked.trojanv1.1 from the System

Several user reports have been registered about a threat called Wormp2p.tanked.trojanv1.1 appearing on a Windows Firewall alert. wormp2p.tanked.trojanv1.1 is most likely distributed via file sharing on peer-to-peer communities. Other similar threats have been monitored during the past several months. In…

THREAT REMOVAL
p16_0000

Rane.exe, Generic Dropper.agu Detection and Removal

In some cases, malware is reported to take over certain .exe files to spread onto computers. In other instances, .exe files sneak into the system and turn out to be Trojan horses or other types of malicious software. If you…

THREAT REMOVAL
ransomware-virus

JS/Banker.BA JavaScript Trojan Removal Manual

JS/Banker.BA is classified as JavaScript Trojan that is currently attacking users and obtaining their banking credentials. What most probably happens is the user logs in his bank account with his password, and his anti-virus program (if any) displays a notification…

THREAT REMOVAL
p11_0000

Updater.exe – Removal and Description

Many users have reported in forums seeing an unfamiliar process, going by the name of updater.exe. Experts from file.net have concluded that this process is not a natural Windows system process, and measures should be taken towards the removal of…

THREAT REMOVAL
p11_0000

Remove TrojanSpy:Win32/Bholog from the System

Microsoft has recently detected TrojanSpy:Win32/Bholog.B as a Trojan horse and spyware. Numerous AV programs detect the threat. Hence, it has a high detection rate. TrojanSpy:Win32/Bholog.B is most likely distributed via spam email attachments and corrupted websites. The threat may also…

THREAT REMOVAL
rp_p4_0000-150x150.jpg

Remove Exploit:HTML/Axpergle.N – Angler Exploit Kit Component

Exploit:HTML/Axpergle.N is a threat identified by Microsoft Security specialists. It has been first discovered in 2014 but has been recently reactivated. As the threat’s name suggests, it is designed to explore for vulnerabilities in newer versions of Microsoft Silverlight and…

THREAT REMOVAL
threat-removal.jpg

Remove Win32:Adloader-AC [Trj] Successfully

Win32:Adloader-AC [Trj] is classified as a Trojan horse, designed to infect and harm a specific computer instead of spreading itself onto many others like most Trojan horses do. Malware experts recommend its immediate removal. Win32:Adloader-AC [Trj] Description Win32:Adloader-AC [Trj] Trojan…

THREAT REMOVAL
Trojan-Horse

Identify and Remove Backdoor:Win32/Chaapt.A

Backdoor:Win32/Chaapt.A has been detected as a Trojan horse with backdoor capabilities. This means that it can connect to a Control&Command server and allow cyber criminals perform a range of malicious operations. Furthermore, once it is inside the system, Backdoor:Win32/Chaapt.A will…

THREAT REMOVAL
Clicktheapp

Trojan.Agent.UX and SpamTool.Agent.SBK Removal

Trojan.Agent.UX is classified as a Trojan horse that infiltrates the system and compromises its data. Trojan.Agent.UX is reported to have data-stealing capabilities. Furthermore, the targeted machine can become a part of a botnet. Some security researchers point out that Trojan.Agent.UX…

THREAT REMOVAL
rp_p4_0000-150x150.jpg

Complete Removal of Win32/TrojanDownloader.Adcurl

Win32/TrojanDownloader.Adcurl is classified as a Trojan downloader that may be the cause of severe damages on an infected system. The longer Win32/TrojanDownloader.Adcurl is running undetected on the computer, the more dangerous the threat becomes. As reported by security researchers at…

THREAT REMOVAL
pop-ups-adware-adcloud

Why You Need to Remove Adcloud

As you can guess by the name, Adcloud is an ad-supported program that aims to generate revenue to its sponsors. Experts warn that the presence of Adcloud in your system may not be healthy and recommend its removal. What Is…

THREAT REMOVAL
facebook-change-color-virus

Removal of Facebook Change Color Virus?

One of Facebook Virus variants called Facebook Change Colour has been gaining popularity in the cyber-security research fields. It has been classified to be a Trojan Horse which may affect some users via the most popular social network in the…

THREAT REMOVAL
Trojan-Horse

MSN Virus Removal Manual

What is MSN Virus? This is a malicious infection, and, as its name implies, it uses the MSN IM service to spread to various systems. It has two intentions: to steal your usernames and passwords, as well as any other…

THREAT REMOVAL
Trojan-Horse

Removal Manual For Trojan:Win32/Dynamer!ac

There have been reports, that a trojan horse type of malware has appeared on the security research ‘radar’. This kind of infection allows cyber-criminals to have complete accessibility to a computer system, it has been started on. Usually, Trojan horses…

THREAT REMOVAL
rp_pc-150x150.png

How to Get Rid of BabMaint.exe

What is BabMaint.exe and What Does it Do? BabMaint.exe (also known as asbabmaint.x and redirect.js) is a malicious executable related to a variety of browser hijackers. You do not want to have this messing with your browser as it will…

THREAT REMOVAL
Trojan-Horse

Amazon Virus Description and Removal

Amazon Virus a malicious worm-like application that is reported to replicate automatically and infect a vast number of systems via email. Once on the user computer, the application may have a set of tools that it might use in a…

THREAT REMOVAL
wpad-dat-download

Remove wpad.browserupdatecheck.in/wpad.dat and wpad.dat

STF researchers have already reported about URL:Mal detected in svchost.exe. The number of affected users has increased, as visible by their complaints. However, it is now known that the infection is associated with the URL wpad.browserupdatecheck.in/wpad.dat. Keep in mind that…

THREAT REMOVAL
p4_0000

WORM/Lodbak.Gen2 and WORM/LNK.Lodbak.Gen Removal Manual

The Lodback variants are malware commonly referred as Worms. They were discovered recently, and some users report them to infect their systems. The specifics that differ this malware from others are that it focuses mainly on flash drive data. What…

THREAT REMOVAL
fix your computer

Trojan.Multi.TaskRun.a Description and Removal Manual

Trojan.Multi.TaskRun.a has been recently detected by some antivirus programs while performing a full system scan as a Trojan horse. The threat may have entered the system via spam emails or drive-by downloads. Several malicious email campaigns have been reported spreading…

THREAT REMOVAL
Trojan-Horse

Ad.fly Shortener Exploited for Malvertising. HanJuan Exploit Kit Loaded

Another malvertising campaign has been detected, redirecting users to the HanJuan exploit kit (EK) also known as Timba Trojan and Fobber. An advertising service – Ad.fly has been compromised and exploited to link users to a piece of malicious software…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree