VirTool:Win32/Obfuscator.XZ is a malware that looks for system flaw in order to get into your PC. On other times, this Trojan misleads you to download software update, or deceive you to visit certain link. By any chance, once you make yourself believe to this nasty trick by VirTool:Win32/Obfuscator.XZ, chances are you will have added malware […]
Trojan.Agent.TPL is a malware program that you must remove as soon as you detect it. This Trojan can be filled in your system as fast as you never imagine. It has the ability to steal private data’s and right after forward it to remote servers just as quick as you can imagine. Before you knew […]
TrojanDownloader:Win32/Vundo.J is a Trojan that sneaks into computer via spam email messages, which contain text about recent events and occasions. Other victims used to download this virus when they are tricked by misleading web sites.
JS/Redir.BP is a computer malware that when executed will execute a code to redirect your browser to specified web pages. This threat normally arrive as malicious Java Script file. It comes attached to spam email messages or links from social networking sites. On most instances, user executes the script unintended upon visiting web sites that […]
Trojan:DOS/Rovnix.D is a kind of Trojan that can be too risky when it reaches a computer. It is observed that this Trojan has multi-component and belongs to a family of malware. Trojan:DOS/Rovnix.D is deployed by means of another Trojan from the same group. It can be acquired from compromised web sites, spam emails, social networking […]
Trojan:Win32/Urausy.D is detection for a variant of Trojan originating from Urausy family. This kind of threat intends to block user’s access to the PC and demands payment to unlock. It denies your access by showing warning message in full screen view and contains bogus alert. Trojan:Win32/Urausy.D often disguise as a letter from authorities telling you […]
Trojan:DOS/Alureon.E refers to an infected Volume Boot Records (VBR) of the computer. This is caused by certain variants of Alureon Trojan. The threat is so harmful and will target both systems in 32-Bit and 64-Bit. With rootkit involved, Trojan:DOS/Alureon.E controls how the system boots while loading the harmful code. Rootkit also hides the presence of […]
Win32/Small.CA is a detection for Trojan files that performs certain malicious actions once installed on the computer. The Trojan belongs to a big group that has so many variants who can serve risky purposes, hence, they are utilized to download and execute other threats originating from a remote server.
Win32:ZAccess-PB [Trj] is a Trojan that carries a component of backdoor and rootkit. The Trojan can gather sensitive information from the infected computer. It may also allow a remote attacker to access the computer and manipulate some settings.