Trojans - Page 168 category archyve:


Trojan.Vundo.gen!C is a computer infection classified as Trojan, although some of its components are detected as adware as well. This infection is a multi-component family of programs that can seriously damage your system security and even target your money. Rather than just meddling with your system processes, malware these days aim to rip financial gain to its creators so you should remove Trojan.Vundo.gen!C from your computer at once, to avoid dire consequences. Run a full system scan with SpyHunter free scanner to check whether you are infected with Trojan.Vundo.gen!C  and similar threats. Read more »

Pushdo Trojan

Pushdo Trojan is an exceptionally dangerous Windows infection which was first detected in September of 2007. Unfortunately, the sinister program has prevailed and even became stronger. According to researchers, the malicious Trojan can be spread various security vulnerabilities, including corrupted bundled downloads and spam email attachments. If you notice a suspicious email received from an unknown sender with the subject line “Card from Adult Friend Finder” (or similar), you should remove it without opening. Read more »


MsCtfMonitor.exe is a malicious process file that is related to XP Defender 2013 group of fake antivirus programs. This file is classified as cloaked malware, which means that it stealthily enters your system and tries to remain undetected for as long as possible in order for the malicious program (it is related to) to reach its goals. Basically it means that if you have MsCtfMonitor.exe on your PC, there is a 100% chance that you are infected with other malware as well (most likely - rogue antispyware), so if you decide to remove MsCtfMonitor.exe, be sure to terminate all the related applications as well. Read more »


Trojan.Sality is a highly dangerous infection which can connect the infected computer to a botnet and download additional files. As the threat is able to disable security programs, your anti-virus software may not detect the infection.  The threat attempts to infect every executable file which is located on local, removable and other drives.  At the time when the threat was created, it was less complicated because it was able only to download new malware and record the user’s keystrokes. Read more »


Worm:Win32/Morto.A is a dangerous computer worm which is employed by remote attackers in order to get unauthorized access to an infected computer. It has been created to compromise administrator passwords; as a result, it is highly advisable to change login data  if the threat has already infected the system, especially if the usernames and passwords are such as admin, admin2, administrator and 123, 123456, 111111, respectively. Read more »

BlackHole Trojan

If your PC is running disorderly, BlackHole Trojan could be running without any of your acknowledgement. The malicious infection is also know by such names as Backdoor:Win32/Musminim.A, BDS/BlackHol.A and HackTool.Win32.BlackHole.a. The clandestine program can be propagated onto your computer via various security backdoors, including spam email attachments, black-hat SEO scams and bundled downloads, and it is categorized as a backdoor Trojan. This discloses that the malicious application could be used to create connection to remote servers and perform distributed denial of service attacks. Read more »


Hacktool.Crack.Office2007Enterpr is an illegal application which is used for generating a key which can be used multiple times. The activation key is valid; however, it is not a genuine volume license product key (VLK). It can be used by business corporations and other institutions, and it does not require you to register the license online or via phone. Despite the fact that some computer users find Hacktool.Crack.Office2007Enterpr helpful, it is an illegal tool which can also pose some problems, which is why you should remove it from the system as soon as you can. Read more »


FinSpy is a general detection name for a Trojan that can be used for spying unsuspecting computer users. There are quite a few detection names for this computer threat including Trojan-Spy:W32/FinSpyA, Monitoring-Tool:Android/FinSpy.C, Trojan-Spy:WinCE/FinSpy.A, Trojan-Spy:iPhoneOS/FinSpy.A and others. From its name it is possible to infer that FinSpy is able to infect various operating systems including mobile ones, which poses a great threat for everyone connected to the Internet, considering the fast-growing number of mobile device users. Since FinSpy cannot be detected by a user himself, the system should be periodically scanned by an antimalware that would remove FinSpy immediately once detected. Read more »


VirTool:MSIL/Injector.P is a hazardous Trojan horse which will try to compromise your PC once it gets to the system.  The threat functions as a malware downloader as it malicious component enable remote attacker to send commands in order to gain control over the victimized computer. VirTool:MSIL/Injector.P does not have an interface and you can learn about its presence through the symptoms exhibited by  the affiliated files. Read more »


The malicious Trojan:AutoIt/LockScreen.A is a computer infection which has initiated the lock-down of your operating Windows system. Also known as LockScreen.Cl, the clandestine Trojan is responsible for such detrimental infections as the GEMA Virus, Read more »