Trojans - Page 178 category archyve:

Trojan.Tracur.AV

The malicious Trojan.Tracur.AV is a Windows infection know by the names Trojan:Win32/Tracur.AV and Win32/Kryptik.AIZP. The devious application is composed of various malignant dynamic link library files which may corrupt your operating system without your acknowledgement. According to the experts at Anti-Spyware-101.com, the malicious Trojan files Read more »

Adware:Win32/Vidsaver

Adware:Win32/Vidsaver is an adware program that is installed on your browser as browser helper object or browser plugin. The most important thing about this application is that users install Adware:Win32/Vidsaver THEMSELVES. The program can be downloaded at vid-saver.com which is the official website for this application. According to this website, Adware:Win32/Vidsaver is compatible with Internet Explorer, Google Chrome and Mozilla Firefox, and this program allows you to "keep videos for as long as you want, even after the site removes them", that is to say - Adware:Win32/Vidsaver allows you to save the streaming videos you encounter online. Read more »

Trojan.Vundo.gen!C

Trojan.Vundo.gen!C is a computer infection classified as Trojan, although some of its components are detected as adware as well. This infection is a multi-component family of programs that can seriously damage your system security and even target your money. Rather than just meddling with your system processes, malware these days aim to rip financial gain to its creators so you should remove Trojan.Vundo.gen!C from your computer at once, to avoid dire consequences. Run a full system scan with SpyHunter free scanner to check whether you are infected with Trojan.Vundo.gen!C  and similar threats. Read more »

Pushdo Trojan

Pushdo Trojan is an exceptionally dangerous Windows infection which was first detected in September of 2007. Unfortunately, the sinister program has prevailed and even became stronger. According to Anti-Spyware-101.com researchers, the malicious Trojan can be spread various security vulnerabilities, including corrupted bundled downloads and spam email attachments. If you notice a suspicious email received from an unknown sender with the subject line “Card from Adult Friend Finder” (or similar), you should remove it without opening. Read more »

MsCtfMonitor.exe

MsCtfMonitor.exe is a malicious process file that is related to XP Defender 2013 group of fake antivirus programs. This file is classified as cloaked malware, which means that it stealthily enters your system and tries to remain undetected for as long as possible in order for the malicious program (it is related to) to reach its goals. Basically it means that if you have MsCtfMonitor.exe on your PC, there is a 100% chance that you are infected with other malware as well (most likely - rogue antispyware), so if you decide to remove MsCtfMonitor.exe, be sure to terminate all the related applications as well. Read more »

Trojan.Sality

Trojan.Sality is a highly dangerous infection which can connect the infected computer to a botnet and download additional files. As the threat is able to disable security programs, your anti-virus software may not detect the infection.  The threat attempts to infect every executable file which is located on local, removable and other drives.  At the time when the threat was created, it was less complicated because it was able only to download new malware and record the user’s keystrokes. Read more »

Worm:Win32/Morto.A

Worm:Win32/Morto.A is a dangerous computer worm which is employed by remote attackers in order to get unauthorized access to an infected computer. It has been created to compromise administrator passwords; as a result, it is highly advisable to change login data  if the threat has already infected the system, especially if the usernames and passwords are such as admin, admin2, administrator and 123, 123456, 111111, respectively. Read more »

BlackHole Trojan

If your PC is running disorderly, BlackHole Trojan could be running without any of your acknowledgement. The malicious infection is also know by such names as Backdoor:Win32/Musminim.A, BDS/BlackHol.A and HackTool.Win32.BlackHole.a. The clandestine program can be propagated onto your computer via various security backdoors, including spam email attachments, black-hat SEO scams and bundled downloads, and it is categorized as a backdoor Trojan. This discloses that the malicious application could be used to create connection to remote servers and perform distributed denial of service attacks. Read more »

Hacktool.Crack.Office2007Enterpr

Hacktool.Crack.Office2007Enterpr is an illegal application which is used for generating a key which can be used multiple times. The activation key is valid; however, it is not a genuine volume license product key (VLK). It can be used by business corporations and other institutions, and it does not require you to register the license online or via phone. Despite the fact that some computer users find Hacktool.Crack.Office2007Enterpr helpful, it is an illegal tool which can also pose some problems, which is why you should remove it from the system as soon as you can. Read more »

FinSpy

FinSpy is a general detection name for a Trojan that can be used for spying unsuspecting computer users. There are quite a few detection names for this computer threat including Trojan-Spy:W32/FinSpyA, Monitoring-Tool:Android/FinSpy.C, Trojan-Spy:WinCE/FinSpy.A, Trojan-Spy:iPhoneOS/FinSpy.A and others. From its name it is possible to infer that FinSpy is able to infect various operating systems including mobile ones, which poses a great threat for everyone connected to the Internet, considering the fast-growing number of mobile device users. Since FinSpy cannot be detected by a user himself, the system should be periodically scanned by an antimalware that would remove FinSpy immediately once detected. Read more »