virus removal

Trojan.GameThief.Win32.WOW.ggb

Trojan.GameThief.Win32.WOW.ggb Trojan.GameThief.Win32.WOW.ggb also changes the registry values to be automatically executed once a system is rebooted. It opens a backdoor for other malicious programs to infect the system. Once infected by this Trojan, the operating system may start responding very slowly after a while. In the infected system, “Not Responding” pop up frequently appears on […]

Generic15.CJQN

Generic15.CJQN Generic15.CJQN is a computer virus that affects the Windows Operating System. It travels around the web forward via emails and pornographic websites. It causes the system to respond slowly and can even lead to a system crash. It copies itself to the registry values of the system and can even create, new infected files. […]

Worm.Zimuse.A

Worm.Zimuse.A Worm.Zimuse.A is a worm that tricks the user into believing that it is just a zip file. To make itself look more legitimate, it even asks the user for password in order to unzip its contents. It can delete all registry keys and files. It usually stays inactive for a period of 10 days […]

Rootkit.Indag.A

Rootkit.Indag.A Rootkit.Indag.A is a virus which spreads through another malware. The main objective of this virus is to stop any antivirus program running on the system. The objective therefore is to knock off a system’s protection. It usually affects the drivers on the system and registers itself as a device on the system to terminate […]

Trojan.Fakealert.CAW

Trojan.Fakealert.CAW Trojan.Fakealert.CAW spreads by taking advantage of loopholes in the security settings of a system. This allows the system to be compromised by malware and offers control to malicious program. It creates an 8 digit name in documents and settings folder of the system. This makes the system respond by showing pop ups of new […]

Trojan.BAT.AACL

Trojan.BAT.AACL Trojan.BAT.AACL affects Windows based systems by trying to alter their DNS server settings. It entices users as being a legitimate updated version of the iPhone application called jailbreaking. The trojan operates without giving any hint to the user and changes his DNS server address. This makes the system vulnerable to be given instructions from […]

Win32.Worm.Hakaglan.B

Win32.Worm.Hakaglan.B Win32.Worm.Hakaglan.B makes a copy of itself inside the system32 folder in the Windows OS. It disables the Task Manager, registry tools and folder options by altering the registry values of the Windows OS.This Trojan spreads around via Yahoo Messenger, removable media and shared networks. The Trojan usually increases its footprint by making itself look […]

Trojan.KillAV.RS

Trojan.KillAV.RS Trojan.KillAV.RS is a Trojan which hampers the security of the system by stopping verification of files. It deletes the cryptographic service (cryptsvc) built within the Windows OS; technically, this halts the verification of digital signatures. Also affected are Windows Updates and firewall settings due to removal of cryptsvc. It also takes several screenshots of […]

RTL.805

RTL.805 RTL.805 is a Trojan which usually spreads via third party applications. Applications such as free gaming app or free software are its major carriers. This virus also alters the registry values to be rebooted every time the system is rebooted. It takes large amount of memory often resulting in programs not being executed. One […]

Trojan.Fake.Av.Kyn

Trojan.Fake.Av.Kyn Trojan.Fake.AV.Kyn is a Trojan that pretends to be a security program. It claims to clean the system of any unwanted malware and files. The Trojan will create an .exe file in documents and settings from where the registry settings are altered. All this is done to ensure the Trojan is booted at every fresh […]

Copyright © 2024 DP Tech Group