Category Archives: Trojan Horses

Backdoor Win32/Fynloski.A removal guide

Backdoor Win32/Fynloski.A

Backdoor Win32/Fynloski.A also known as DarkComet is a repackaged version of a remote access tool (RAT). Backdoor Win32/Fynloski.A allows unauthorized access and control of an affected computer. It is capable of downloading and executing other malicous files. Besides that the “Backdoor Win32/Fynloski.A” trojan wil also collect system information, record keystrokes and is able to steal passwords from known applications and websites. When your computer is infected with Backdoor Win32/Fynloski.A a… Read More »

PUM.UserWLoad – Trojan.Ransom removal instructions

PUM.UserWLoad - Trojan.Ransom

PUM.UserWLoad is a difficult to remove remnant of the Trojan.Ransom infection. PUM.UserWLoad is a register reference which the permissions are modified so that they can not be removed in the normal way. When you run a scan with Malwarebytes Anti-Malware and over again the same items are detected, when PUM.UserWLoad and Trojan.Ransom should be deleted on restart then will have to be removed in a different way. PUM.UserWLoad is the malicious… Read More »

Trojan Win32 Tracur.AV removal instructions

Trojan Win32 Tracur.AV

Trojan Win32 Tracur.AV is Trojan Horse that will redirect your Internet search queries to a malicious URL and allows backdoor access and control. The Trojan Win32 Tracur.AV is also able to install other malware on the comprmised computer. The main intention of Trojan Win32 Tracur.AV is to deploy a different malware that has a wide payload onto the target system. Dropped files and what it can cause to the system can be… Read More »

E-mail from your ISP – infected computer

E-mail from your ISP - infected computer

When you get an email from your ISP with the notification about a infected computer, then it is possible that one of the computers is actually infected with malware. Many Internet Service Providers are able to monitor malicious traffic from your account, and this kind of -email messages are often sent automatically to their customers to inform about the infection. Usually, there will be indicated in the e-mail which malware… Read More »

Lost Access to Microsoft Security Essentials or Windows Defender

ZeroAccess - ReparsePoints

When you try to open Microsoft Security Essentials or Windows Defender and you got the message “Windows cannot access the specified device, path, or file. You may not have the appropriate permissions to access the item.” then your computer is probably infected with the new variant of the ZeroAccess rootkit. This rootkit wil change the “symlinks” Junction reparse point of Microsoft Security Essentials or Windows Defender. In the most cases… Read More »

Win32 Ransom – Removal Instructions

Win32 Ransom NB [trj] - Removal Guide

Win32 Ransom or Win32:Ransom-NB [trj] is a specific detection named by avast! to recognize malware called ransomware. The presence of Win32 Ransom or Win32:Ransom-NB [trj] will lock your computer, with ransomware like Reveton, Urausy or other variants and can trigger more damages on the PC by downloading other malware from a remote server. The main intention of this Trojan Horse or Ransomware is to lock the computer and depending on the user’s current… Read More »

Trojan Horse Generic29.AJGE – Removal Instructions

Trojanhorse Generic29.AJGE - Removal Guide

Trojan Horse Generic29.AJGE is probably one of the most difficult infections to remove from your computer, Trojanhorse Generic29.AJGE is a typical detection name of AVG Antivirus or AVG Internet Security. This Trojanhorse Generic29.AJGE  is also known as Sirefef, ZeroAccess, Rootkit.0access or Trojan.0access rootkit. One of the most common symptoms of Trojan Horse Generic29.AJGE is that services.exe is infected, the rootkit will modify or overwrite this file. Because this is an essential systemfile… Read More »

Win32 Usteal [SPY] – Removal Guide

Win32-Usteal-[SPY] - Removal Guide

Win32 Usteal [SPY]  or Win32:Usteal [SPY] is a specific detection named by avast! to recognize malware called Trojan Horses and Spyware. The presence of Win32 Usteal [SPY]  or Win32:Usteal [SPY] on your system can trigger more damages on the PC by downloading other malware from a remote server. The main intention of this Trojan Horse or Spyware is to deploy a different malware that has a wide payload onto the target system.… Read More »

Iexplorer.exe is running in background

Iexplorer.exe is running in background

Iexplorer.exe is running in background is a common problem related to a virus or other malware, normally when you use Internet Explorer it is possible that there are multiple (iexplorer.exe) processes may be active at the same time. But when Internet Explorer is not active and there are several (iexplorer.exe) processes present in the taskmanager then your computer probably is infected with malware. Below is a list of the most… Read More »

Win32-FakeAV – Removal Instructions

Win32-FakeAV - Removal Guide

Win32-FakeAV or Win32-FakeAV-EWP [trj] is a specific detection named by avast! to recognize malware calles Trojan Horses like Rogueware (FakeAV). The presence of Win32-FakeAV or Win32-FakeAV-EWP [trj] on your system can trigger more damages on the PC by downloading other malware from a remote server. The main intention of this Trojan Horse is to deploy a different malware that has a wide payload onto the target system. Dropped files and what… Read More »