Tag Archives: Trojan

Remove JS/ProxyChanger.BW [Free Removal Instructions]

Remove JS/ProxyChanger.BW trojan

JS/ProxyChanger.BW is Trojan Horse that will redirect your Internet search queries to a malicious URL and allows backdoor access and control. The JS/ProxyChanger.BW malware is also able to install other malware on the comprmised computer. The main intention of JS/ProxyChanger.BW is to deploy a different malware that has a wide payload onto the target system. Dropped files and what it can cause to the system can be variable. Malware authors… Read More »

Zekos malware infection (Removal Guide)

Zekos malware infection (Removal Guide)

The Zekos trojan als known as Trojan.Patched.Zekos is responsible for problems like (audio ads playing in background). The Zekos trojan will modify (infect) rpcss.dll and svchost.exe. Once the Zekos malware is installed it will connect to a command and control server, and can also monitor your internet activity. The most antivirus vendors will detect Zekos using their heuristic engine of behaviour blocker, but the zero-day variants are often difficult to detect… Read More »

Win32-FakeAV – Removal Instructions

Win32-FakeAV - Removal Guide

Win32-FakeAV or Win32-FakeAV-EWP [trj] is a specific detection named by avast! to recognize malware calles Trojan Horses like Rogueware (FakeAV). The presence of Win32-FakeAV or Win32-FakeAV-EWP [trj] on your system can trigger more damages on the PC by downloading other malware from a remote server. The main intention of this Trojan Horse is to deploy a different malware that has a wide payload onto the target system. Dropped files and what… Read More »

Trojan.Downloader – Removal Instructions

Trojan.Downloader - Removal Instructions

Trojan.Downloader is a specific detection name to recognize harmful programs that aims to drop silently other malware files onto the compromised computer. The presence of Trojan.Downloader on your system can trigger more damages on the computer because many malware contains a backdoor for remote access. The main intention of this Trojan Horse is to deploy a different malware that has a wide payload onto the target system. Dropped files and what it… Read More »

Royal Canadian Mounted Police virus – Removal Guide

Royal Canadian Mounted Police virus - Removal Guide

The Royal Canadian Mounted Police virus is a ransomware variant that belongs to the Trojan:Win32/Urausy.C family also known as Trojan-Ransom.Win32 and Win32/LockScreen.APR. The Royal Canadian Mounted Police virus will display a fake notification, that pretends to be from the International Cyber Security Protection Alliance The Royal Canadian Mounted Police virus will completely lock you out of your computer, so when you’ll try to log on into your Windows operating system or Safe Mode with… Read More »

Ireland’s National Police Service virus – removal guide

Ireland’s National Police Service virus Removal Guide

The Ireland’s National Police Service virus is a ransomware variant that belongs to the Trojan.Win32.Urausy family also known as Trojan-Ransom.Win32 and Win32:LockScreen. The Ireland’s National Police Service virus will display a fake notification, that pretends to be from the Guard of the preace Military Police corps. The Ireland’s National Police Service virus will completely lock you out of your system and applications, so when you’ll try to log on into… Read More »

FBI Cybercrime Division Ransomware [Removal Guide]

FBI Cybercrime Division Ransomware Removal Guide

The FBI. Cybercrime Division or International Cyber Security Protection Alliance infection is a variant of ransomware from the Urausy family. When installed this ransomware does not allow you to access your computer or your files without a paying the fake fine. When infected with this Trojan, you will be shown a ransom screen instead of your Windows desktop when you login to Windows. This ransom screen will state that the… Read More »

Trojan:JS/Medfos.B [Removal guide]

Trojan.MedfosB Removal Guide

Trojan:JS/Medfos.B is as trojan that installs a browser extension on your browser like Internet Explorer, Google Chrome and Mozilla Firefox. Being as a vicious JavaScript file, the virus has the ability to modify your search results while you are using search queries such as Bing, Google and Yahoo. Usually, it would hijack your browser to harmful domain that associated with some commercial contents which only wants you to spend money… Read More »