Search.autocompletepro.com

Posted: October 24, 2012 | Category: Browser Hijackers
Search.autocompletepro.com Search.autocompletepro.com is a subdomain of autocompletepro.com, a website that uses drive-by-download exploits to install its malicious browser add-on. PCs that are infected by AutoComplete Pro will be redirected to Search.autocompletepro.com during browser searches and may also experience significant lag in website loading times. While Search.autocompletepro.com tries to promote itself as a handy search engine alternative that's linked to an optional web-browsing tool,...

Ergative.com

Posted: October 24, 2012 | Category: Browser Hijackers
Ergative.com is a search engine site that uses Google to power its search results. Although SpywareRemove.com malware analysts haven't found signs of Ergative.com being dangerous, they have seen recent attacks that have forced web browsers to load Ergative.com nonconsensually. Repetitive redirects to Ergative.com are an indication of a probable browser hijacker infection that should be considered a minor security risk to your computer. Some browser hijackers may also be installed with...

ZeroAccess.hi

Posted: October 24, 2012 | Category: Rootkits
ZeroAccess.hi is a kernel mode ZeroAccess rootkit infection that can damage the targeted operating system. ZeroAccess.hi is distributed with free content such as e-books. ZeroAccess.hi is installed into the location of the affected computer system that provides connection between software and hardware. If the connection is disrupted, the PC user might be unable to control the computer. Therefore, extra precautions should be used for removal of ZeroAccess.hi. ZeroAccess.hi might be difficult...

Gen:Trojan.Heur.FU.au

Posted: October 24, 2012 | Category: Trojans
Gen:Trojan.Heur.FU.au is a Trojan that often disturbs PC users as a false positive emerging while loading legitimate files. Gen:Trojan.Heur.FU.au is flagged for Flash Player update and other legitimate applications. If anti-virus software is active, the installation of Gen:Trojan.Heur.FU.au might be blocked. Even if completed, the security program blocks the installation by removing the object it finds malicious. Gen:Trojan.Heur.FU.au allows attackers to gain remote access and control over...

Auf Ihrem Computer ist infiziert Virus Ransomware

Posted: October 24, 2012 | Category: Ransomware
Auf Ihrem Computer ist infiziert Virus is a ransomware Trojan that displays an erroneous warning message about infections on your computer. This warning, besides blocking other programs, also attempts to get the PC user to pay a worthless ransom fee that supposedly helps them procure software that can disinfect their computer. Like any ransomware Trojan, the Auf Ihrem Computer ist infiziert Virus is entirely fraudulent and doesn't have any ties to any entities other than criminal...

Austrian Police Virus Ransomware

Posted: October 24, 2012 | Category: Ransomware
Austrian Police Virus Ransomware Austria's own little piece of Europe's overall surge in ransomware-based attacks, the Austrian Police Virus pretends to be a notification from law enforcement but, in reality, is a ransomware Trojan that's used to extort money from deceived victims. After its installation (which usually involves sophisticated delivery systems that can include spam, drive-by-downloads or, especially, Trojans from the Reveton family), the Austrian Police Virus displays a warning message that claims that your...

Politiet Norge Ukash Ransomware Virus

Posted: October 24, 2012 | Category: Ransomware
Politiet Norge Ukash Ransomware Virus The Politiet Norge Ukash Virus is a ransomware-based PC threat that's enabled by members of the Reveton family of Trojans, which are often launched by Citadel Trojans and other sophisticated types of malware. Common infection methods include spammed social media links and drive-by-downloads (such as the infamous Blackhole Exploit Kit). Once it's installed, the Politiet Norge Ukash Virus displays a warning message in Norwegian that claims that your computer is locked due to its affiliation...

Pum.disabled.securitycenter

Posted: October 23, 2012 | Category: Fake Warning Messages
Pum.disabled.securitycenter is a potentially unwanted message (PUM), which notifies PC users of disabled Windows Security Center and other programs. Pum.disabled.securitycenter usually indicates disruption in the white-listed area. Instead of removal, some repair work may be needed. You should not rush into removal of Pum.disabled.securitycenter by deleting the files for which the security threat is flagged. That might be a misleading method by existing anti-virus software to avoid default...

VirTool:Win32/CeeInject.gen!HP

Posted: October 23, 2012 | Category: Trojans
VirTool:Win32/CeeInject.gen!HP is a Trojan that propagates as a malevolent file. VirTool:Win32/CeeInject.gen!HP is covered by using certain methods to evade detection and removal of security tools. VirTool:Win32/CeeInject.gen!HP is generally encrypted and/or compressed and stored inside another application, which decodes the malevolent file and loads it. VirTool:Win32/CeeInject.gen!HP may be embedded into a clean process or loaded in its process.

VirTool:Win32/VBInject.ZM

Posted: October 23, 2012 | Category: Trojans
VirTool:Win32/VBInject.ZM is a Trojan that spreads as a malicious file. VirTool:Win32/VBInject.ZM obfuscates itself by using specific methods to avoid detection and removal of anti-virus software. VirTool:Win32/VBInject.ZM is written in Visual Basic and the malicious code is stored encrypted. The original file behaves as a loader for the encrypted malicious code, thus the code could have virtually any goal. A malicious file is generally encrypted and/or compressed and stored inside another...

Oficina Virtual de Denuncias Ransomware Virus

Posted: October 23, 2012 | Category: Ransomware
Oficina Virtual de Denuncias Ransomware Virus The Oficina Virtual de Denuncias Virus is a variant of a Reveton Trojan-based ransomware attack that distinguishes itself by localizing the specifics of its warnings to the country of the infected PC. In the case of the Oficina Virtual de Denuncias Virus, that means Spain, since IP addresses that correspond to other countries will experience other PC threats (such as France's France Ministère de l'Intérieur Virus or Finland's POLIISI Osasto Tietoverkkorikollisuuden Virus ). Attacks by...

POLIISI Osasto Tietoverkkorikollisuuden Ransomware Virus

Posted: October 23, 2012 | Category: Ransomware
POLIISI Osasto Tietoverkkorikollisuuden Ransomware Virus While old variants of ransomware Trojans are still credible threats, POLIISI Osasto Tietoverkkorikollisuuden Virus is part of a new revamp to Reveton -based ransomware Trojans and uses sophisticated-looking warning messages that include legal references, webcam captures, IP address displays and other information that's designed to make it look as though your PC is in serious legal trouble. The POLIISI Osasto Tietoverkkorikollisuuden Virus, which is targeted at Finnish PC users, displays a...

France Ministere de l’Interieur Ransomware Virus

Posted: October 23, 2012 | Category: Ransomware
France Ministere de l’Interieur Ransomware Virus The France Ministère de l'Intérieur Virus is a pop-up alert that's created by a variant of the Reveton Trojan or (as it's referred to casually) the Ukash Virus . Like the similar but less visually sophisticated Votre ordinateur est bloqué Gendarmerie Ransomware , the France Ministère de l'Intérieur Virus displays a fake pop-up that claims that your computer has been locked by the government of France due to your illegal activities. The truth is that the France Ministère de l'Intérieur Virus...

WORM_MORTO.SM

Posted: October 22, 2012 | Category: Worms
WORM_MORTO.SM is a worm, which uses Remote Desktop Protocol (RDP) to spread itself. WORM_MORTO.SM is distributed by other PC threats or dropped as a malicious file downloaded unknowingly by PC users when visiting malicious websites. WORM_MORTO.SM deletes the initially executed copy of itself. Once installed, WORM_MORTO.SM adds the potentially malicious files as copies of itself into the infected computer system. WORM_MORTO.SM inserts itself into the svchost.exe process in order to stay...

PE_MUSTAN.A

Posted: October 22, 2012 | Category: Malware
PE_MUSTAN.A is a virus that attacks your computer's anti-virus programs, spreads through networks, infects wide ranges of files and attempts to connect to a remote server for instructions on additional attacks. While SpywareRemove.com malware research team has seen signs of PE_MUSTAN.A being a potential update to the WORM_MORTO.SM worm or at least a program designed by the same team of coders, PE_MUSTAN.A is more than dangerous enough by itself and can potentially allow criminals to control...

Trojan.Smowbot

Posted: October 22, 2012 | Category: Trojans
Trojan.Smowbot is a Trojan that opens a back door and drops more PC threats onto the affected computer. Once executed, Trojan.Smowbot copies itself by adding the potentially malicious files. Trojan.Smowbot then creates the certain registry entry so that it can run automatically every time you start Windows. Trojan.Smowbot creates the certain registry entries to bypass the Windows firewall. Trojan.Smowbot also modifies numerous registry entries. Trojan.Smowbot attempts to contact a...

VirTool:INF/Autorun.gen!F

Posted: October 22, 2012 | Category: Worms
VirTool:INF/Autorun.gen!F is a general label that's applied to malicious Autorun.inf files. VirTool:INF/Autorun.gen!F files can be used to cause malware, especially worms, to launch and install themselves on other computers automatically whenever a VirTool:INF/Autorun.gen!F-infected drive is accessed. Because VirTool:INF/Autorun.gen!F files are simple text-based configuration files, they aren't capable of harming your computer by themselves or of performing any actions other than assisting...

JS:Redirector-B

Posted: October 22, 2012 | Category: Trojans
JS:Redirector-B is a browser hijacker that exploits JavaScript vulnerabilities to change the web page content that your browser displays. These attacks may be used to alter preexisting web pages, force you to be exposed to malware-downloading attacks or even monitor and steal confidential information. However, most browser hijackers like JS:Redirector-B infections are used to redirect you to semi-harmless sites for the sake of profiting from the increase in traffic or artificial clicks on...

Luxembourg Police Ransomware Virus

Posted: October 22, 2012 | Category: Ransomware
Luxembourg Police Ransomware Virus The Luxembourg Police Virus may tell you that Luxembourg Police Virus is a notice from French law enforcement that's forced to lock your PC because of the crimes that you've committed, but SpywareRemove.com malware researchers have connected its true origins to ransomware Trojans that exploit random PC users for criminal profits. Luxembourg Police Virus's family of ransomware Trojans, known as Reveton , distributes different alerts for various countries throughout North America and Europe,...

Virus.Neshta.B

Posted: October 22, 2012 | Category: Viruses
Virus.Neshta.B (Virus.Win32.Neshta.b) is a virus that affects executable files by modifying them. Once installed on the corrupted PC, Virus.Win32.Neshta.b injects a malicious code at the beginning of an attacked .exe file so that the malicious code runs before the remaining original part of the file. Therefore, after these modifications, the original part of the file might not run at all. Virus.Win32.Neshta.b needs to be removed from the infected computer system correctly by covering the...