Trojan - Page 36

Home > Trojan

WHAT IS TROJAN HORSE?

This category provides detailed articles about Trojan attacks, and gives instructions on how to remove spyware, keyloggers, cryptominers (cryptocurrency miners), rootkits, typically spread via Trojan infections. If you suspect having a Trojan infection on your system, refer to our Trojan removal guides.

THREAT REMOVAL
Trojan-Horse

MSN Virus Removal Manual

What is MSN Virus? This is a malicious infection, and, as its name implies, it uses the MSN IM service to spread to various systems. It has two intentions: to steal your usernames and passwords, as well as any other…

THREAT REMOVAL
Trojan-Horse

Removal Manual For Trojan:Win32/Dynamer!ac

There have been reports, that a trojan horse type of malware has appeared on the security research ‘radar’. This kind of infection allows cyber-criminals to have complete accessibility to a computer system, it has been started on. Usually, Trojan horses…

THREAT REMOVAL
rp_pc-150x150.png

How to Get Rid of BabMaint.exe

What is BabMaint.exe and What Does it Do? BabMaint.exe (also known as asbabmaint.x and redirect.js) is a malicious executable related to a variety of browser hijackers. You do not want to have this messing with your browser as it will…

THREAT REMOVAL
Trojan-Horse

Amazon Virus Description and Removal

Amazon Virus a malicious worm-like application that is reported to replicate automatically and infect a vast number of systems via email. Once on the user computer, the application may have a set of tools that it might use in a…

THREAT REMOVAL
wpad-dat-download

Remove wpad.browserupdatecheck.in/wpad.dat and wpad.dat

STF researchers have already reported about URL:Mal detected in svchost.exe. The number of affected users has increased, as visible by their complaints. However, it is now known that the infection is associated with the URL wpad.browserupdatecheck.in/wpad.dat. Keep in mind that…

THREAT REMOVAL
p4_0000

WORM/Lodbak.Gen2 and WORM/LNK.Lodbak.Gen Removal Manual

The Lodback variants are malware commonly referred as Worms. They were discovered recently, and some users report them to infect their systems. The specifics that differ this malware from others are that it focuses mainly on flash drive data. What…

THREAT REMOVAL
fix your computer

Trojan.Multi.TaskRun.a Description and Removal Manual

Trojan.Multi.TaskRun.a has been recently detected by some antivirus programs while performing a full system scan as a Trojan horse. The threat may have entered the system via spam emails or drive-by downloads. Several malicious email campaigns have been reported spreading…

THREAT REMOVAL
Trojan-Horse

Ad.fly Shortener Exploited for Malvertising. HanJuan Exploit Kit Loaded

Another malvertising campaign has been detected, redirecting users to the HanJuan exploit kit (EK) also known as Timba Trojan and Fobber. An advertising service – Ad.fly has been compromised and exploited to link users to a piece of malicious software…

THREAT REMOVAL

Svchost.exe URL:Mal Description and Removal Manual

Several users have complained about a svchost.exe file detected by Avast. As a result, their antivirus program has been continuously displaying warning pop-ups about svchost.exe detected as a threat. The infection itself has been determined as URL:Mal and it may…

THREAT REMOVAL
Everything

Everything.exe Description

There have been a lot of fusses lately, regarding a file, called everything.exe. Users have a lot of concerns whether or not it is malware. After research, we have established that it is a useful and efficient freeware file searching…

THREAT REMOVAL
PC risk

Is utcservice.exe Process Dangerous? utcservice.exe Errors

Several users have reported that utcservice.exe is running in their task managers. The users’ concerns are rooted back to the fact that the process appears unknown and unrelated to any applications they have installed. utcservice.exe is described as an essential…

THREAT REMOVAL
p5_0000

Trojan.Swort Spreading via MERS-themed Malicious Emails

Symantec has discovered a new attack of the Trojan.Swort, spread via MERS-themed emails. MERS stands for Middle East Respiratory Syndrome – a respiratory virus that is new to humans. The exploitation of the MERS theme is likely provoked by the…

THREAT REMOVAL
taskman-rpcnet-exe

Rcpnet.exe Classification and Removal

Reports have recently increased about a process in Microsoft Windows, called rcpnet.exe, believed to be located in C:\WINDOWS\system32\rpcnet.exe. This program is not considered to be a virus and has been reported to be the process of the service Remote Procedure…

THREAT REMOVAL
InfectionTime

Duqu 2.0 Intelligence Stealer Description and Removal

Duqu also known as Duqu 2.0, W32.Duqu and W32.Duqu.B is classified as a collection of malware found in September 2011 by a security team from the Budapest University of Technology and Economics. It is a sophisticated threat that has even…

THREAT REMOVAL
download now

Remove TrojanDownloader:Win32/Rottentu.A Completely

TrojanDownloader:Win32/Rottentu.A is a Trojan Horse that has been detected by Microsoft and several anti-malware programs. The threat is reported to download and installs potentially unwanted programs and pieces of malicious software onto the victim’s PC without his initial consent or…

THREAT REMOVAL
malware

Trojan-Downloader.MSWord.Agent.Jk Description and Removal Manua

Trojan-Downloader.MSWord.Agent.Jk is classified as a Trojan horse that has been detected by prevalent number of AB solutions. The Trojan has various aliases. Microsoft detects it under the name TrojanDownloader:W97M/Adnel. A list of other names of the malicious threat is provided…

THREAT REMOVAL
trojan_horse

Remove Downloader.Picproot Trojan from the Syste

Downloader.Picproot is a recently discovered Trojan horse that is detected by Symantec. The Trojan affects the Windows operating system. Even though its threat level is considered low, Downloader Picproot should be removed timely so that severe consequences are avoided. A…

THREAT REMOVAL
computer-worm

I-worm.dumaru.c a.k.a. Dumaru Worm Removal Manual

I-worm.dumaru.c or as some users refer to it – Dumaru Worm is an Internet worm that has been around for quite some time. It spreads via corrupted email attachments. If the user opens the email attachment and executes the file,…

THREAT REMOVAL
Cinemax Video 1.9cV24.02

Keylog 95 Properties and Removal Manual

Keylog 95 or Keylog95.exe has been around for some quite some time. The keylogger may also be similar to Win32/Monitor.KeyLog.95.A. Keylog 95 records the user’s strokes in a file called C:\win\logx. Keylog 95 is mostly employed for hacking computers that…

THREAT REMOVAL
Backdoor-Trojan

TopAntiSpyware Components and Removal Manual

Security researchers have detected TopAntiSpyware as a serious threat, a type of a Trojan horse. Even though more research is needed to confirm that TopAntiSpyware is a Trojan, it is already clear that TopAntiSpyware is a malicious application. Once installed…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree