Trojan.Agent.MRGGen

Posted: July 9, 2012 | Category: Trojans
Trojan.Agent.MRGGen is a Trojan that leads to lots of computer problems including web-browsing issues such as blocked favorite websites in order to perform identity thefts, usage of the hidden attribute to frequently opened files and folders. Trojan.Agent.MRGGen creates several centers to store its components in the affected computer system.

W32.Ramnit.D!inf

Posted: July 9, 2012 | Category: Worms
W32.Ramnit.D!inf is a worm that downloads another worm called W32.Ramnit.B on to the infected computer. W32.Ramnit.D!inf spreads on removable USB drives. W32.Ramnit.D!inf can create an Autorun.Inf file on the root of each drive inserted to the affected PC. W32.Ramnit.D!inf will run automatically if the infected drive is accessed, causing the targeted computer system much problems.

Java.Cogyeka

Posted: July 9, 2012 | Category: Worms
Java.Cogyeka is a worm that circulates through removable and mapped drives. Java.Cogyeka also drops a remote file onto the infected computer. Once executed, Java.Cogyeka creates several potentially malicious files. Java.Cogyeka also creates the certain registry entry. Java.Cogyeka downloads a module from the specific location '[RANDOM LETTERS].[DOMAIN NAME]:[RANDOM PORT NUMBER]'. Java.Cogyeka opens a random UDP port on the targeted PC that is used by the downloaded module.

Trojan horse Patched_c.LZE

Posted: July 9, 2012 | Category: Trojans
Trojan horse Patched_c.LZE is a Trojan that is installed as a file called services.exe. The original services.exe file consists of multiple components that are overwritten by Trojan horse Patched_c.LZE, or the Trojan drops itself as a new entry. Trojan horse Patched_c.LZE can delete essential items on the targeted computer system. The important part of the legitimate file services.exe might be deleted, which triggers system errors that differ according to the functionality of deleted items.

Trojan.Agent/Gen-Sefnit

Posted: July 9, 2012 | Category: Trojans
Trojan.Agent/Gen-Sefnit is a Trojan that shows up even after the computer has been restarted or rescanned because this Trojan is difficult to detect and remove by many security tools. Trojan.Agent/Gen-Sefnit allows attackers to gain remote access and control over the affected computer system. Trojan.Agent/Gen-Sefnit uses the infected PC as a spybot for sending spam email messages, spying on victims and malicious advertising. Trojan.Agent/Gen-Sefnit is able to reload itself by damaging the...

Win32:Atraps-pf

Posted: July 6, 2012 | Category: Trojans
Win32:Atraps-pf is a PC threat that's often installed (and reinstalled as necessary) by rootkits that include backdoor Trojan capabilities. Win32:Atraps-pf exhibits no symptoms of its attacks other than alerts from appropriately-perceptive anti-malware programs, but SpywareRemove.com malware researchers always recommend treating Win32:Atraps-pf, like all components of a rootkit-based attack, as a high-level PC threat to be exterminated quickly and thoroughly. Because Win32:Atraps-pf is...

Win32/Sirefef.R

Posted: July 6, 2012 | Category: Trojans
Win32/Sirefef.R is a component of the iniquitous and widely-distributed ZeroAccess rootkit, which is identified by Microsoft under the umbrella term of the Sirefef family of Trojans. Win32/Sirefef.R may refer to one of several PC threats from this family, including malicious code that's inserted into normal files like a virus, a Trojan dropper or a self-contained Trojan. Win32/Sirefef.R isn't necessarily guaranteed to display symptoms of its existence, but Win32/Sirefef.R will always be...

Troj/BredoZp-KP

Posted: July 6, 2012 | Category: Trojans
Troj/BredoZp-KP is a Zip archive that's used to distribute the Trojan Troj/Agent-WXL , a PC threat that compromises your computer's security by making unauthorized contact with remote IP addresses. Spam e-mail that carries Troj/BredoZp-KP can be identified by their characteristic subject line of 'You pig!' along with accompanying text that implies that the file attachment is a collection of compromising pictures. Opening Troj/BredoZp-KP will result in your PC being infected by...

Troj/Agent-WXL

Posted: July 6, 2012 | Category: Trojans
Troj/Agent-WXL is a Trojan that's distributed by recent spam e-mail campaigns that pretend to be sent by the LinkedIn professional networking site. Spam messages that propagate Troj/Agent-WXL are identifiable by their hostile but vague messages, which purport to include attached pictures (of a presumably risque or compromising nature), and their usage of a 'You pig!' subject header. If you delete Troj/Agent-WXL spam habitually, you shouldn't be in significant danger of having your PC infected...

Cheapstuff.com

Posted: July 6, 2012 | Category: Browser Hijackers
Cheapstuff.com markets itself as a search engine for local shopping bargains, coupons and similar deals. However, malware experts have acquired an interest in Cheapstuff.com due to its indirect connection with browser hijackers. Symptoms of infection by a Cheapstuff.com-related browser hijacker are easy to identify, since you'll be redirected to Cheapstuff.com or your browser will display Cheapstuff.com-related error messages whenever you visit popular sites (such as Facebook, Yahoo or...

‘The Great Britain Police Central e-crime Unit’ Ransomware

Posted: July 6, 2012 | Category: Ransomware
‘The Great Britain Police Central e-crime Unit’ Ransomware 'The Great Britain Police Central e-crime Unit' ransomware is a British variant of globe-spanning ransomware that's been united under the nickname of the 'Ukash Virus.' Like Police Central e-crime Unit (PCEU) ransomware , the Metropolitan Police ransomware Trojan Office Central de Lutte contre la Criminalité ransomware Polisen Enhetnen för Databrott ransomware or GVU Gesellschaft zur Verfolgung ransomware , 'The Great Britain Police Central e-crime Unit' ransomware attempts to lock your...

Troj/Ransom-HC

Posted: July 5, 2012 | Category: Trojans
Troj/Ransom-HC is a Windows-based ransomware Trojan that encrypts various files on your PC to make them unusable and recommends that you pay a high fine to unlock your files. In addition to its ransom pop-up, Troj/Ransom-HC also includes a secondary pop-up alert that warns that 'spam' and child pornography-related files will be turned over to the police if you don't pay the decryption fee. In spite of this warning, SpywareRemove.com malware researchers haven't observed any functions in...

Trojan Horse Generic28.BWII

Posted: July 5, 2012 | Category: Trojans
Trojan Horse Generic28.BWII is a Trojan that causes unwanted browser redirects on the infected computer system. Some of the redirects executed by Trojan Horse Generic28.BWII promote Internet pages supported by scammers, other suspicious websites may download and install other malware infections onto the corrupted PC through a backdoor channel created by Trojan Horse Generic28.BWII to a remote loading center administrated by attackers. The attackers' center also gains main configuration...

Trojan.JS.Agent.GHP

Posted: July 5, 2012 | Category: Trojans
Trojan.JS.Agent.GHP is a JavaScript Trojan that uses lots of different methods to identify a malicious code. Trojan.JS.Agent.GHP contacts a remote server and gets the name of the next URL to open stealthily for the aim of installing other malware infections. Trojan.JS.Agent.GHP can vbe detected in random Java files. Trojan.JS.Agent.GHP can invade the targeted computer system without the victim's permission and knowledge.

Trojan.Loopas.C!inf

Posted: July 5, 2012 | Category: Trojans
Trojan.Loopas.C!inf is a Trojan and detection for files that are affected by the Trojan.Loopas family of PC threats. Trojan.Loopas.C!inf may spread as a CHM (help) file that dowmloads the malicious payload. Once executed, Trojan.Loopas.C!inf copies itself as the certain file. Trojan.Loopas.C!inf also drops potentially malicious files. Trojan.Loopas.C!inf then corrupts the particular file to launch the main file of the Trojan. Trojan.Loopas.C!inf then deletes numerous files....

Boot.Mebromi.B

Posted: July 5, 2012 | Category: Trojans
Boot.Mebromi.B is a Trojan that tries to affect the BIOS and the Master Boot Record (MBR). Once executed, Boot.Mebromi.B may copy itself to the particular location. Boot.Mebromi.B may modify the Windows Registry. Boot.Mebromi.B can access the BIOS information of the compromised PC. If the BIOS is an Award BIOS and the BIOS is not already infected, Boot.Mebromi.B tries to infect the BIOS by generating the particular file. Boot.Mebromi.B may connect to the specific remote location....

JS:Banker-IC

Posted: July 4, 2012 | Category: Trojans
JS:Banker-IC is a Java-based banking Trojan that monitors your web-browsing activities and intercepts confidential information that's transmitted to bank websites. This can result in identity theft, unauthorized online transactions and other exploits that misuse your personal information for criminal profit. Although JS:Banker-IC should be, like most banking Trojans, a high-level PC threat, SpywareRemove.com malware analysts have found relatively few symptoms of JS:Banker-IC's attacks, which...

Win32/Sirefef.FB.Gen

Posted: July 4, 2012 | Category: Rootkits
Win32/Sirefef.FB.Gen is a component of a Sirefef Trojan or ZeroAccess Rootkit infection that's often found infecting services.exe – a native component of Windows. Because Win32/Sirefef.FB.Gen was only added to the databases of many PC security companies late in June of 2012, your anti-malware applications may be unable to find Win32/Sirefef.FB.Gen if they haven't been updated. Like all members of this family, Win32/Sirefef.FB.Gen should be considered a high-level threat to your computer,...

W32.Gammima.AG

Posted: July 4, 2012 | Category: Worms
W32.Gammima.AG is a spyware-themed worm that distributes itself via removable media (USB thumb drives and similar devices) and steals passwords from popular online games. Recent updates to W32.Gammima.AG have added to its capabilities and made W32.Gammima.AG compatible for attacks against Diablo 3 accounts, and W32.Gammima.AG is capable of running on most versions of Windows. As long as you enact proper precautions when in contact with removable devices and have updated anti-malware software...

Trojan Horse Generic_r.AZH

Posted: July 4, 2012 | Category: Trojans
Trojan Horse Generic_r.AZH is a Trojan that is detected in Windows directory in two locations at once, as a part of 'explorer.exe' and Systems32 executable named 'services.exe'. Trojan Horse Generic_r.AZH is hidden as a computer game, and instead of the anticipated content, the affected PC user gets critical .exe files modified that significantly slows down Windows and its specific programs. Trojan Horse Generic_r.AZH intercepts requests to Windows Explorer so that PC users cannot access some...