Archive for Roger

Win32/Chksyn.AQ

Win32/Chksyn.AQ Win32/Chksyn.AQ is a virus that affects Windows based operating systems. It usually gets inside the system by talking advantage of out-of-date applications on the system. It copies itself with a random name and keeps changing its name and location inside the system to avoid easy detection. It also captures information on the online activities […]

Farfli.PZ

Farfli.PZ Farfli.PZ is a Trojan horse which acts as a catalyst to add more malware on the infected system. It modifies the system registry entries and system files. The Trojan ensures that it is automatically executed when the system is rebooted. It exposes the system to be attacked by other malware; the Trojan is also […]

Adware.NaviPromo.Gen.5

Adware.NaviPromo.Gen.5 Adware.NaviPromo.Gen.5 is a malware that uses rootkit techniques to hide its files. The files are hidden on the disk and memory of the system. It infects the system and gives no real indication of its activities to the user. It is passed on to the system with software available for download from sites such […]

Hoax.Win32.Renos.cgh

Hoax.Win32.Renos.cgh Hoax.Win32.Renos.cgh is Trojan virus which replicates itself and makes changes in the system files. It is carried by a range of channels from emails and malicious web pages to removable media and network sharing platforms. It kicks off every time a system is rebooted and consumes most of the system’s resource to slow down […]

Trojan.GameThief.Win32.WOW.ggb

Trojan.GameThief.Win32.WOW.ggb Trojan.GameThief.Win32.WOW.ggb also changes the registry values to be automatically executed once a system is rebooted. It opens a backdoor for other malicious programs to infect the system. Once infected by this Trojan, the operating system may start responding very slowly after a while. In the infected system, “Not Responding” pop up frequently appears on […]

Generic15.CJQN

Generic15.CJQN Generic15.CJQN is a computer virus that affects the Windows Operating System. It travels around the web forward via emails and pornographic websites. It causes the system to respond slowly and can even lead to a system crash. It copies itself to the registry values of the system and can even create, new infected files. […]

Worm.Zimuse.A

Worm.Zimuse.A Worm.Zimuse.A is a worm that tricks the user into believing that it is just a zip file. To make itself look more legitimate, it even asks the user for password in order to unzip its contents. It can delete all registry keys and files. It usually stays inactive for a period of 10 days […]

Rootkit.Indag.A

Rootkit.Indag.A Rootkit.Indag.A is a virus which spreads through another malware. The main objective of this virus is to stop any antivirus program running on the system. The objective therefore is to knock off a system’s protection. It usually affects the drivers on the system and registers itself as a device on the system to terminate […]

Trojan.Fakealert.CAW

Trojan.Fakealert.CAW Trojan.Fakealert.CAW spreads by taking advantage of loopholes in the security settings of a system. This allows the system to be compromised by malware and offers control to malicious program. It creates an 8 digit name in documents and settings folder of the system. This makes the system respond by showing pop ups of new […]

Trojan.BAT.AACL

Trojan.BAT.AACL Trojan.BAT.AACL affects Windows based systems by trying to alter their DNS server settings. It entices users as being a legitimate updated version of the iPhone application called jailbreaking. The trojan operates without giving any hint to the user and changes his DNS server address. This makes the system vulnerable to be given instructions from […]

Copyright © 2025 DP Tech Group