TrojanSpy:MSIL/Neos.A

Posted: July 24, 2012 | Category: Trojans
TrojanSpy:MSIL/Neos.A is a dangerous computer infection known to be a Trojan horse. TrojanSpy:MSIL/Neos.A may be used to allow a remote attacker to gain access to the infected system where personal information or other data may be compromised. TrojanSpy:MSIL/Neos.A adds entries to the registry and masks itself as an executable file making it difficult to manually detect and remove. It is very important to utilize methods to automatically detect and remove TrojanSpy:MSIL/Neos.A before it is...

Trojan.LockScreen

Posted: July 23, 2012 | Category: Trojans
The LockScreen family is a group of ransomware Trojans that display fraudulent alerts about Internet-oriented crimes and lock your computer down while requesting that you pay a Ukash-facilitated fine. Similar to the Ukash Virus or Ransom.DU family of ransomware Trojans, LockScreen family members attempt to determine the infected PC's country (based on its IP address) and display a region-appropriate pop-up (for example, by including your country's flag colors or references to a local...

International Police Association (I.P.A.) Ransomware

Posted: July 23, 2012 | Category: Malware
International Police Association (I.P.A.) Ransomware The International Police Association (I.P.A.) Virus is a ransomware Trojan from the LockScreen family, and, like all members of this group, attempts to lock your PC and request a ransom payment via Ukash to regain computer access. While the International Police Association (I.P.A.) Virus's characteristic warning message claims to be a notification from the IPA regarding illegal file-trafficking and other Internet misdeeds, the International Police Association (I.P.A.) Virus, as illegal...

Trojan.Lameshield

Posted: July 23, 2012 | Category: Trojans
Trojan.Lameshield is a technical ID for various brand names of rogue anti-malware scanners from the Winwebsec family of scamware. Under most circumstances, you shouldn't need to notice an anti-malware alert about Trojan.Lameshield to notice its presence, since Trojan.Lameshield causes extremely visible symptoms that include fake security alerts, disabled web browsers and system scans with results that aren't anywhere near reality. Because Trojan.Lameshield may also download other PC threats...

PTCH_SIREFEF.L

Posted: July 23, 2012 | Category: Trojans
PTCH_SIREFEF.L is a generic detection for a system file (typically services.exe, the 'Services Control Manager' for Windows) that's been infected by a member of the Sirefef family. PTCH_SIREFEF.L is usually used to launch other Sirefef-based PC threats automatically, and, as such, can display a range of different symptoms – or to the converse, no symptoms at all. Standard behavior for PTCH_SIREFEF.L and similar PC threats includes code-injection into unrelated memory processes, which...

Trojan.Horse.Dropper.Generic.cMII

Posted: July 23, 2012 | Category: Trojans
Trojan.Horse.Dropper.Generic.cMII is a Trojan that contains an installer and component to install itself on the targeted machine. The installer runs as decoder to the malware threat it installs and is packed and encrypted to evade its detection by security programs. Trojan.Horse.Dropper.Generic.cMII is injected very deeply into critically important system files; therefore, it is hard to identify and eliminate by many anti-virus software. Most security applications are able to eliminate only...

Trojan:Win64/Sirefef.AA

Posted: July 23, 2012 | Category: Trojans
Trojan:Win64/Sirefef.AA is a component of a Sirefef (also known as Max++ or ZeroAccess ) rootkit infection, a PC threat that's noted for flexible payloads and a multiple-component structure that's often used to hijack your web browser or install rogue security programs. All components of a Sirefef infection should be considered potentially high-level PC threats, and Trojan:Win64/Sirefef.AA isn't an exception to this general rule. Besides redirecting your online searches to harmful websites,...

Luhe.Sirefef.A

Posted: July 23, 2012 | Category: Trojans
Luhe.Sirefef.A is known as a Trojan and detection name used to name rogue security programs that pretend to be able to detect and remove all types of PC threats from the affected computer system. Rogue security applications also generate PC scan reports that notify about numerous security issues found on the targeted PC. Luhe.Sirefef.A contains rootkit capabilities that make it difficult to detect and remove from the compromised PC. Luhe.Sirefef.A can also block access to legitimate security...

Trojan.Vcaredrix.A

Posted: July 23, 2012 | Category: Trojans
Trojan.Vcaredrix.A is a Trojan horse that may populate a system with several malicious executable files. Once infected, a PC may allow remote connections by hackers who could steal data. Through Trojan.Vcaredrix.A, a cybercriminal may be able to obtain passwords and other online login credentials without any indication to the computer user. An antimalware application may be used to eliminate the threat of Trojan.Vcaredrix.A.

Trojan.Multex.A

Posted: July 23, 2012 | Category: Trojans
Trojan.Multex.A is a Trojan that poses as a genuine software program and, thus, attempts to mislead and convince affected PC users into downloading and installing it. Trojan.Multex.A is generated by web attackers to stay hidden on an infected computer. Trojan.Multex.A enables attackers to obtain remote access and control over the compromised PC. Trojan.Multex.A can steal personal information from victims and send it to a remote server via the Internet. Trojan.Multex.A may serve simply as a...

Grum

Posted: July 20, 2012 | Category: Malware
Grum, also known as TROJ_BUZUS.BKM, Infostealer.Banker.C , Spammer:Win32/Tedroo.A, Trojan.Win32.Buzus.cqit and Win32/Injector.AJF, is a spambot Trojan that was used to distribute mass-mailed e-mail messages. Until recently, Grum was capable of exploiting an infected PC's resources to distribute itself, other PC threats and links to various sites, but action by law enforcement agencies and ISPs have deactivated Grum's servers as of July 18th. Although Grum doesn't have the ability to switch...

Trojan.Tobfy

Posted: July 20, 2012 | Category: Trojans
Trojan.Tobfy (Tobfy Trojan) is a dangerous Trojan horse that is related to ransom messages. Ransom messages rendered from the Tobfy Trojan could ask that a fee be paid for purported illegal actions performed. Usually the messages will appear to come from law enforcement agencies and actually lock up parts of a system. Removal of the Tobfy Trojan threat may be accomplished through the use of an antispyware program.

Trojan.Gataka.D

Posted: July 20, 2012 | Category: Trojans
Trojan.Gataka.D is a dangerous Trojan horse that may degrade the integrity and stability of an infected PC. Once installed, Trojan.Gataka.D may load during boot process and then cause a system to be vulnerable to remote attacks. Additionally, Trojan.Gataka.D could allow an attacker to obtain stored data from the infected system. Trojan.Gataka.D may be safety detected and removed with an updated antimalware application.

Trojan.Weelsof.A

Posted: July 20, 2012 | Category: Trojans
Trojan.Weelsof.A (Trojan:Win32/Weelsof.A) is a Trojan that may be a part of an online scam known as ransomware. Trojan:Win32/Weelsof.A may lock the desktop of the targeted computer and ask PC users to disclose personal information in order to restore the computer to the normal state. Trojan:Win32/Weelsof.A may lock the compromised PC without any possibility to use it. Trojan:Win32/Weelsof.A displays a pop-up warning message, which demands a ransom from PC users to be paid to unlock the...

Trojan.Waprox.A

Posted: July 20, 2012 | Category: Trojans
Trojan.Waprox.A has close associations with backdoor Trojans from its same family (Waprox) and a high chance of complicity in spyware-based attacks that steal private information. While Trojan.Waprox.A can be a severe problem for your computer's safety and confidentiality, SpywareRemove.com malware research team has been unable to discern any distinct symptoms of a Trojan.Waprox.A infection, and, under normal circumstances, recommend that you use anti-malware software to find and delete...

Trojan.Weelsof.C

Posted: July 20, 2012 | Category: Trojans
Trojan.Weelsof.C is a Microsoft-specific detection for a Trojan that's often associated with ransomware Trojan-based attacks, such as alerts from members of the Ukash Virus or Lockscreen families. Because closely-related PC threats to Trojan.Weelsof.C attacks have also been confirmed by SpywareRemove.com malware analysts as possessing flexible backdoor functions, a Trojan.Weelsof.C infection also may correspond with security attacks that can allow criminals to exert a dangerous level of...

Worm.Gamarue.I

Posted: July 20, 2012 | Category: Worms
Worm:Win32/Gamarue.I is a variant of the Gamarue worm that installs other malicious software onto your computer. Both spam e-mail messages and infected removable drives can be infection vectors for Worm:Win32/Gamarue.I, which is capable of creating new copies of itself and enabling these copies to launch on fresh computers automatically. Because Worm:Win32/Gamarue.I includes some advanced system changes and will conceal its components within normal Windows processes, SpywareRemove.com malware...

Trojan.Ransom.EZ

Posted: July 20, 2012 | Category: Trojans
Trojan.Ransom.EZ (Trojan:Win32/Ransom.EZ) is a Trojan that poses as a genuine software program and, thus, attempts to mislead and convince affected PC users into downloading and installing it. Trojan:Win32/Ransom.EZ is generated by web attackers to stay hidden on an infected computer. Trojan:Win32/Ransom.EZ enables attackers to obtain remote access and control over the compromised PC. Trojan:Win32/Ransom.EZ can steal personal information from victims and send it to a remote server via the...

Troj/JSAgent-CK

Posted: July 20, 2012 | Category: Trojans
Troj/JSAgent-CK is an HTM file that redirects you to a malicious site, currently noted as a host for one version of the Blackhole Exploit Kit (a configurable PC threat that allows harmful software to be installed on your computer without your consent). Troj/JSAgent-CK is readily-discernible as a file attachment that's distributed in e-mail spamming campaigns, with current formats of Troj/JSAgent-CK's e-mails using fake notifications of electronic money transferals. This mean of distribution...

Downloader.Parshell

Posted: July 20, 2012 | Category: Trojans
Downloader.Parshell is a Trojan downloader parasite. Downloader.Parshell is known to start downloads from the internet where it may install malicious files onto the infected system. Moreover, Downloader.Parshell could startup a remote connection to a hacker where stored data could be stolen. To completely eliminate the threat of Downloader.Parshell, it may be removed using an updated antispyware program.