Trojan - Page 44

Home > Trojan

WHAT IS TROJAN HORSE?

This category provides detailed articles about Trojan attacks, and gives instructions on how to remove spyware, keyloggers, cryptominers (cryptocurrency miners), rootkits, typically spread via Trojan infections. If you suspect having a Trojan infection on your system, refer to our Trojan removal guides.

THREAT REMOVAL
InfectionTime

Duqu 2.0 Intelligence Stealer Description and Removal

Duqu also known as Duqu 2.0, W32.Duqu and W32.Duqu.B is classified as a collection of malware found in September 2011 by a security team from the Budapest University of Technology and Economics. It is a sophisticated threat that has even…

THREAT REMOVAL
download now

Remove TrojanDownloader:Win32/Rottentu.A Completely

TrojanDownloader:Win32/Rottentu.A is a Trojan Horse that has been detected by Microsoft and several anti-malware programs. The threat is reported to download and installs potentially unwanted programs and pieces of malicious software onto the victim’s PC without his initial consent or…

THREAT REMOVAL
malware

Trojan-Downloader.MSWord.Agent.Jk Description and Removal Manua

Trojan-Downloader.MSWord.Agent.Jk is classified as a Trojan horse that has been detected by prevalent number of AB solutions. The Trojan has various aliases. Microsoft detects it under the name TrojanDownloader:W97M/Adnel. A list of other names of the malicious threat is provided…

THREAT REMOVAL
trojan_horse

Remove Downloader.Picproot Trojan from the Syste

Downloader.Picproot is a recently discovered Trojan horse that is detected by Symantec. The Trojan affects the Windows operating system. Even though its threat level is considered low, Downloader Picproot should be removed timely so that severe consequences are avoided. A…

THREAT REMOVAL
computer-worm

I-worm.dumaru.c a.k.a. Dumaru Worm Removal Manual

I-worm.dumaru.c or as some users refer to it – Dumaru Worm is an Internet worm that has been around for quite some time. It spreads via corrupted email attachments. If the user opens the email attachment and executes the file,…

THREAT REMOVAL
Cinemax Video 1.9cV24.02

Keylog 95 Properties and Removal Manual

Keylog 95 or Keylog95.exe has been around for some quite some time. The keylogger may also be similar to Win32/Monitor.KeyLog.95.A. Keylog 95 records the user’s strokes in a file called C:\win\logx. Keylog 95 is mostly employed for hacking computers that…

THREAT REMOVAL
Backdoor-Trojan

TopAntiSpyware Components and Removal Manual

Security researchers have detected TopAntiSpyware as a serious threat, a type of a Trojan horse. Even though more research is needed to confirm that TopAntiSpyware is a Trojan, it is already clear that TopAntiSpyware is a malicious application. Once installed…

THREAT REMOVAL
Botnet-example

JS:Iframe-CLO [Trj] Detailed Description and Removal Options

JS:Iframe-CLO [Trj] is classified as a JavaScript Trojan horse that may seriously affect the Windows OS. Researchers suspect that the Trojan is spread via corrupted links and suspicious downloads. Opening malicious email attachments is another possible entrance for JS:Iframe-CLO [Trj].…

THREAT REMOVAL
backdoor_trojan

Trojan.Disabler.88 Removal Manual

Trojan.Disabler.88 is classified as a Trojan horse. Trojan.Disabler.88 may be similar to Trojan.Disabler. It is capable of closing the user’s applications without his knowledge or consent. Thus, the user may lose important data if his system is infected with Trojan.Disabler.88.…

THREAT REMOVAL
pc

Examine and Remove Uninstall.exe File

Uninstall.exe is described as an executable file that is found after the installation of various legitimate software products. The file’s purpose is to help users uninstall the very same products when needed. Keep in mind though that uninstall.exe is not…

THREAT REMOVAL
malware

Trojan:Win32/Lodbak.A!lnk Removal Manual

Trojan:Win32/Lodbak.A!lnk is a Trojan horse that is spread online through removable drives (such as USB) and shared network drives. A number of users have already complained that Trojan:Win32/Lodbak.A!lnk has entered their systems through infected USBs. Surely enough, Trojans may be…

THREAT REMOVAL
fade

fade.exe Classification and Removal Manual

fade.exe is an executable file, a keylogger in nature, that is designed to start a parasite on an infected computer. Once executed, fade.exe will run a process and activate a payload. It is important to note that fade.exe may be…

THREAT REMOVAL
PC security

E-Card.exe Removal Manual

E-Card.exe is an executable process part of a Trojan infection, which enters the user’s system as an attachment to an email message designed to look like a greeting card from a family member. E-Card.exe is associated with various security related…

THREAT REMOVAL
computer_safety

TrojanDownloader:Win32/Zetdorm.A Removal Manual

TrojanDownloader:Win32/Zetdorm.A is classified as a Trojan horse that downloads and installs other programs (including malware) on the affected system. Security experts recommend running a full scan of the affected computer and removing TrojanDownloader:Win32/Zetdorm.A and any detected threats with a competent…

THREAT REMOVAL
malware

Trojan.VBS.UEF Removal Manual

Trojan.VBS.UEF is a Trojan that infiltrates the system unnoticed by the user and displays fake security warnings from the Avast Free Antivirus program. Trojan.VBS.UEF can download malware on the computer and slow down the system performance. Once the threat is…

THREAT REMOVAL
Rombertik

Rombertik Info-Stealing Trojan Destroys Hard Drives If Detected

Rombertik, a new piece of malware has been detected in the wild recently. What makes the threat unique is its aggressive behavior towards any attempts to be monitored. If Rombertik recognizes that it is being analyzed, it tries to overwrite…

THREAT REMOVAL
malware

TrojanDropper:Win32/Woozlist.a Removal Manual

TrojanDropper:Win32/Woozlist.a is a Trojan horse that may be active on the affected machine without giving any sign of its presence to the PC user. TrojanDropper:Win32/Woozlist.a is known to connect to a remote host, thus allowing cyber crooks to gain access…

THREAT REMOVAL
Backdoor-trojan-removal

Trojan.Werdlod Removal Manual

Trojan.Werdlod is a Trojan horse that can open a back door on the affected computer and download other potentially unsafe programs (including adware or even malware). Trojan.Werdlod may cause overall system instability and lead to the execution of tasks and…

THREAT REMOVAL
trojan_horse

Trojan.Downeks!gm Removal Manual

Trojan.Downeks!gm is detected as a Trojan horse by several security applications. Trojan.Downeks!gm affects computers running all version of Windows operating system, and although its risk level is marked as very low, its removal is advisory for security reasons. Malware experts…

THREAT REMOVAL
computer-security

Remove NetFilter from Your Computer

NetFilter also known as Win64/Riskware.NetFilter is classified as a Trojan horse that is designed to steal the user’s sensitive data and allow remote access to the affected machine. The presence of NetFilter on your machine can be indicated by system…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree