Trojan.Mebromi.A

Posted: June 13, 2012 | Category: Trojans
Trojan.Mebromi.A is a Trojan that tries to affect the BIOS and the Master Boot Record (MBR). Once executed, Trojan.Mebromi.A may copy itself to the certain location. Trojan.Mebromi.A deletes the particular registry entry. Trojan.Mebromi.A accesses the BIOS information of the infected computer. If the BIOS is an Award BIOS and the BIOS is not already infected, Trojan.Mebromi.A tries to infect the BIOS by generating the specific file. Trojan.Mebromi.A connects to the particular remote location....

Generic BackDoor!1sw

Posted: June 13, 2012 | Category: Backdoors
Generic BackDoor!1sw is a backdoor Trojan opens a 'backdoor' and, thus, allows attackers to gain remote access and control over the targeted computer. A surreptitious channel is maintained by the exploit, which restores Generic BackDoor!1sw and downloads it again. Generic BackDoor!1sw might be difficult to detect and remove from the infected computer. Generic BackDoor!1sw might also be able to drop more malware threats to the affected PC.

‘Votre ordinateur est bloque’ Belgium Ransomware

Posted: June 13, 2012 | Category: Ransomware
‘Votre ordinateur est bloque’ Belgium Ransomware 'Votre ordinateur est bloqué' Belgium Ransomware is a Belgium-based variant of what's sometimes referred to as the Ukash Virus, a ransomware Trojan that issues fake e-crime notifications and attempts to extort a ransom from its victims. 'Votre ordinateur est bloqué' Belgium Ransomware and the rest of its family have acquired their nickname due to preferential usage of the otherwise legitimate Ukash payment service, although, in some cases, other methods of money transferral (such as...

cpv.servefeed.info

Posted: June 12, 2012 | Category: Browser Hijackers
cpv.servefeed.info Cpv.servefeed.info is a site that's used to promote irrelevant advertisements (otherwise known as spam), adult erotic advertisements and malicious content, including rogue registry cleaner programs. Although PC threats that are aligned with Cpv.servefeed.info may use various methods of browser hijacks and redirects for their attacks, typical behavior for these browser hijackers involves heavy exploitation of pop-ups. Pop-ups for Cpv.servefeed.info may be confined to a given browser or...

Troj/Agent-WMO

Posted: June 12, 2012 | Category: Trojans
Troj/Agent-WMO, also identified by the alias Trojan-Spy.Agent, is a Trojan that's distributed by e-mail spam, with templates similar to those used by Trojans like Win32/Cbeplay.P , Mal/Zbot-FV and members of the BredoZp family. Although SpywareRemove.com malware researchers haven't finalized an analysis of Troj/Agent-WMO at the time of this writing, Troj/Agent-WMO is a significantly-dangerous PC threat with a high chance of including capabilities for installing other PC threats or stealing...

Trojan Defiler G

Posted: June 11, 2012 | Category: Trojans
Trojan Defiler G is a Trojan that displays fake pop-up messages loaded from the Internet. Trojan Defiler G operates as a browser hijacker and, thus, gains access to the hijacked web browser. Trojan Defiler G can change your search results on any search engine and redirect you to unwanted or even dangerous websites. Trojan Defiler G controls web-navigation application under the pretense of a legal PC user. Trojan Defiler G can show a bogus pop-up alert and block the PC once you start your...

Trojan.maljava!gen3

Posted: June 11, 2012 | Category: Trojans
Trojan.maljava!gen3 is a generalized detection for JavaScript exploits that are associated with the Trojan.Maljava family. Because SpywareRemove.com malware research team has often found such exploits to be linked to attempts to install malicious software, it's recommended that you immediately scan your PC after any possible contact with Trojan.maljava!gen3 or similar Java-based attacks. If you don't have adequate anti-malware software on your PC, Trojan.maljava!gen3 alerts may not trigger,...

Trojan Horse Generic28.AEXX

Posted: June 11, 2012 | Category: Trojans
Trojan Horse Generic28.AEXX is a Trojan downloader that is installed onto the targeted computer system via drive-by downloads or website exploits by bringing its copies onto PCs.Trojan Horse Generic28.AEXX contacts remote servers. Trojan Horse Generic28.AEXX can also drop additional malware threats to the infected computer system. Trojan Horse Generic28.AEXX can make the targeted PC to malfunction. Trojan Horse Generic28.AEXX is difficult to detect and remove by many security programs.

Win32/Weelsof

Posted: June 11, 2012 | Category: Trojans
Weelsof is a ransomware family consisting of Police Trojans and similar threats that display fake legal alerts. Although different versions of Weelsof Trojans are years-old in distribution, recent attacks have provided possible evidence of renewed infection methods that target potential airline customers. For deleting Weelsof and similar Trojans, malware experts recommend standard security protocols for disabling their warning messages, after which a suitable anti-malware product should be...

‘Il Suo computer e’stato bloccato’ Ransomware

Posted: June 11, 2012 | Category: Ransomware
'Il Suo computer e'stato bloccato' Ransomware is an Italian variant of the 'Ukash Virus' family of ransomware Trojans, and, like all members of its family, uses fraudulent crime warnings to extract a fee from its victims. While 'Il Suo computer e'stato bloccato' Ransomware will display a message that claims that your PC is being blocked on account of illicit activities, there's no point in taking 'Il Suo computer e'stato bloccato' Ransomware at its word, since 'Il Suo computer e'stato...

Packed.Generic.369

Posted: June 8, 2012 | Category: Trojans
Packed.Generic.369 is a Trojan that hides its component in the background in order to avoid detection by anti-virus programs. Encryption may disguise Packed.Generic.369 on the infected computer system where the PC user does not notice its existence until it is too late. Packed.Generic.369 can invade the targeted machine without a victim's permission and knowledge. Additionally, Packed.Generic.369 could be used to allow a remote attacker gain access to the compromised PC.

Trojan.Combsus!inf

Posted: June 8, 2012 | Category: Trojans
Trojan.Combsus!inf is a Windows Trojan. Trojan.Combsus!inf can penetrate into the corrupted PC without the computer user's consent and awareness. Once executed, Trojan.Combsus!inf modifies the certain file. Trojan.Combsus!inf then modifies the Windows Registry entries under the certain subkeys. Trojan.Combsus!inf can collect personal information about the corrupted PC and try to transmit it to a remote server.

Trojan.Taidoor!gen1

Posted: June 8, 2012 | Category: Trojans
Trojan.Taidoor!gen1 is a Trojan that opens a back door on the infected computer. Trojan.Taidoor!gen1 uploads and executes potentially malicious files. Trojan.Taidoor!gen1 then creates the certain registry entry, so that it can run automatically every time you start Windows. Trojan.Taidoor!gen1 injects itself into services.exe if a %ProgramFiles%\Mcafee folder exists. Otherwise, Trojan.Taidoor!gen1 injects itself into svchost.exe. Trojan.Taidoor!gen1 connects to a URL with the specific format....

Findallnow.net

Posted: June 8, 2012 | Category: Browser Hijackers
Findallnow.net While Findallnow.net hasn't acquired much of a reputation of its own, Findallnow.net's affiliation with Findgala.com has led malware researchers to discourage casual contact with Findallnow.net as a probable source of contamination by rogue security software. Symptoms of infection by a Findallnow.net-related PC threat can include fake system alerts, inaccurate system scans by scamware, search engine redirects to Findallnow.net or blocked security applications. Findallnow.net-affiliated...

Trojan.Carberp!gen4

Posted: June 7, 2012 | Category: Trojans
Trojan.Carberp!gen4 is a Trojan that gathers information from the affected computer. Trojan.Carberp!gen4 opens a back door on the targeted PC. Trojan.Carberp!gen4 tries to disable anti-virus software. Trojan.Carberp!gen4 can also modify the registry entries and drop files. Trojan.Carberp!gen4 transmits the collected information such as computer name, operating system, user name and other to the remote server.

www2.mystart.com

Posted: June 6, 2012 | Category: Browser Hijackers
www2.mystart.com Www2.mystart.com is a search engine site that has been noted by some PC security companies as being a host for malicious software. Although widespread confirmation of dangers related to Www2.mystart.com's content isn't yet available, SpywareRemove.com malware experts do recommend caution while interacting with Www2.mystart.com, which uses the same template as mildly disreputable sites like Karmaklick.com . Regardless of the nature of Www2.mystart.com's applicability as a search engine,...

BeesQ.net

Posted: June 6, 2012 | Category: Browser Hijackers
BeesQ.net BeesQ.net is a question-and-answer database similar to Yahoo Answers, although BeesQ.net may not necessarily provide the same high-quality results of a reputable web-based company. Aside from complaints about its questionable but (so far) harmless content, BeesQ.net has also been selected as a favorite landing page for PC threats with browser-redirecting functions. Since browser redirects to sites like BeesQ.net can be symptomatic of malicious software on your computer, SpywareRemove.com...

Trojan Horse Generic_r.AWX

Posted: June 6, 2012 | Category: Trojans
Trojan Horse Generic_r.AWX hides itself in the Windows directory folders called System32 or System64, depending on the type of Windows operating system. Also, Trojan Horse Generic_r.AWX is detected in the kernel Windows directory. Trojan Horse Generic_r.AWX might substitute the explorer.exe file so that the affected PC user cannot navigate through the memory. It is possible to rescue the substituted files, especially if the files are hardly modified. The computer user needs to be skillful...

W32.Menovit

Posted: June 6, 2012 | Category: Worms
W32.Menovit is a worm that tries to proliferate through fixed, mapped and removable drives. Once executed, W32.Menovit replicates itself. W32.Menovit then creates several registry keys so that it can run every time you start Windows. Even if the files are not executable, such as .txt files, the file will still be overwritten with components of W32.Menovit, but the file will have the same extension it initially had. W32.Menovit will also try to stop numerous processes.

Sirefef.Y

Posted: June 6, 2012 | Category: Trojans
Sirefef.Y is a member of the Sirefef or Zero Access family of rootkits and Trojans, and, as such, may be used to thwart your PC's security software or otherwise negatively impact your computer's performance and safety. Besides difficulties with using security-related programs, symptoms of Sirefef.Y and other Sirefef infections can also include random system reboots, search engine hijacks and the presence of rogue anti-malware programs. SpywareRemove.com malware researchers advise you to treat...