Tag Archives: safe mode mbam zeroaccess aswmbr no-manual

JS:Trojan.Script.AAR

JS:Trojan.Script.AAR is a harmful code that is in a form of a JavaScript file. This kind of file usually resides on web server and initiates once it senses a visitor. JS:Trojan.Script.AAR can be an individual file or an obfuscated script embedded into site pages. It typically affects files such as .html, .asp, and .php.

JS:ScriptSH-inf [Trj]

JS:ScriptSH-inf [Trj] is a heuristic detection for a Trojan that appends its code to all JavaScript file of the infected computer. This detection covers all variants coming from the same group that shares the same goal. However, each variant may possess unique payload not found on the other versions.

Rootkit.Boot.Pihar.C

Rootkit.Boot.Pihar.C is a deadly Trojan that has rootkit capability. Being able to conceal its presence on the computer, several antivirus programs may not detect its presence. Moreover, the threat may severely damage Windows files by embedding malicious code into their header. Rootkit.Boot.Pihar.C is not an ordinary malware, it targets the boor sector of infected computer. […]

Trojan Horse Patched_c.LYU

Trojan Horse Patched_c.LYU is a computer malware that is multi-component and belongs to a group of Trojan Horse Patched. Variants from this group are often set off similar payloads when run on the computer. Trojan maker deploy this threat in a manner that user may be deceive in executing the links or attached file.

Win32/Heur

Win32/Heur is a detection for a polymorphic virus that consists of multiple components. Its character is constantly changing to avoid detection and removal. It can be transferred a computer by means of a modified programs with a modified header. Typically, malware author embeds the Trojan code onto legitimate program and upload it to file-sharing networks. […]

Microsoft Security Essential Pro 2013

Microsoft Security Essential Pro 2013, also called MS Security Essential Pro 2013 is a virus that made itself to the list of rogue product. Before it can fool many computer users, there has been on ongoing warning about this malware around computer security group. Microsoft Security Essential Pro 2013 mimics Windows own security tool to stage […]

Luhe.Sirefef.A

Luhe.Sirefef.A is a Trojan that is used to distribute rogue computer programs. It is equipped with a technology that can conceal itself once inside the computer. Luhe.Sirefef.A injects a code to legitimate Windows processes to conceal its activity. This attack is known to computer security world as rootkit. With its capability to run under the […]

Backdoor.Tidserv!kmem

Backdoor.Tidserv!kmem is a traditional detection for threats that are linked to Backdoor.Tidserv group of Trojan. It is using an advance method of hiding itself once it has infected a computer. This process is known to many as rootkit techniques. Most of the time, Backdoor.Tidserv!kmem is used by malware authors to display advertisements and redirect user’s […]

Google Redirect Virus in Google Chrome

Google Redirect Virus in Google Chrome is part of a malware activity that targets Internet browser’s search results. The virus will hijack every search results and points them to unknown web sites. In most recent study, Google Redirect Virus in Google Chrome aims to generate revenue for the malware authors. The threat often redirects the […]

Windows Command Processor Notification Virus

Windows Command Processor Notification is a rogue security program that will issue several alerts on the computer. It is a member of a large group of malware sharing one graphical user Interface (GUI). Meaning, all programs from this group changes its title but not the console.