Slide 1
Your Trusted IT Support Partner Since 2003

We deliver reliable and affordable IT solutions for the Small Business Community.

RSS feed for this section

virus removal

Worm.P2P.Palevo.DP

Worm.P2P.Palevo.DP Worm.P2P.Palevo is a worm that usually spreads by making itself look like a .JPG (image) file. Upon opening the file, the worm is executed and it creates 4 hidden files inside the windows folder. The worm also modifies registry keys to bypass various firewall settings. The worm connects to a server and then, it …

Worm.P2P.Palevo.DP Continue Reading ->

Worm.P2P.Palevo.DP

Worm.P2P.Palevo.DP Worm.P2P.Palevo is a worm that usually spreads by making itself look like a .JPG (image) file. Upon opening the file, the worm is executed and it creates 4 hidden files inside the windows folder. The worm also modifies registry keys to bypass various firewall settings. The worm connects to a server and then, it

Trojan.Dropper.Oficla.O

Trojan.Dropper.Oficla.O Trojan.Dropper.Oficla.O is another Trojan spreading through email attachments. Usually a fake MS word document is its point source to infect a system. It affects the registry files in the system which ensures it is executed at every start up of the system. The following code is run to ensure its execution – [HKLMSoftwareMicrosoftWindows NTCurrentVersionWinlogon]

Trojan.Dropper.Oficla.O

Trojan.Dropper.Oficla.O Trojan.Dropper.Oficla.O is another Trojan spreading through email attachments. Usually a fake MS word document is its point source to infect a system. It affects the registry files in the system which ensures it is executed at every start up of the system. The following code is run to ensure its execution – [HKLMSoftwareMicrosoftWindows NTCurrentVersionWinlogon]

Trojan.Renos.PGZ

Trojan.Renos.PGZ Trojan.Renos.PGZ is a combination of a Trojan and fake antivirus downloader. This Trojan connects to specific websites to execute nasty files. It also modifies registry entries which in turn changes the Internet Explorer settings to lower security settings. The Trojan spreads its footprint in a system by creating unusual processes in .exe files. To

Trojan.Renos.PGZ

Trojan.Renos.PGZ Trojan.Renos.PGZ is a combination of a Trojan and fake antivirus downloader. This Trojan connects to specific websites to execute nasty files. It also modifies registry entries which in turn changes the Internet Explorer settings to lower security settings. The Trojan spreads its footprint in a system by creating unusual processes in .exe files. To

Win32.Viking.Gen

Win32.Viking.Gen Win32.Viking.Gen is a combination of a worm and a virus spreading through removable media and network sharing platforms. One of the common symptoms of getting infected by Viking.Gen is the reduced performance of the infected system. It is a usually seen to have a severe effect on HTML and other executable files. The virus

Win32.Viking.Gen

Win32.Viking.Gen Win32.Viking.Gen is a combination of a worm and a virus spreading through removable media and network sharing platforms. One of the common symptoms of getting infected by Viking.Gen is the reduced performance of the infected system. It is a usually seen to have a severe effect on HTML and other executable files. The virus

Win32.Worm.Prolaco.S

Win32.Worm.Prolaco.S Win32.Worm.Prolaco.S is worm that is known to be generally associated with e-greeting cards. These cards are usually sent via email and the worm is hidden inside the zipped attachments. The worm also spreads via removable media devices, emails and peer to peer file sharing networks. The worm makes multiple copies of itself included a

Win32.Worm.Prolaco.S

Win32.Worm.Prolaco.S Win32.Worm.Prolaco.S is worm that is known to be generally associated with e-greeting cards. These cards are usually sent via email and the worm is hidden inside the zipped attachments. The worm also spreads via removable media devices, emails and peer to peer file sharing networks. The worm makes multiple copies of itself included a

Trojan.Spy.Ursnif.F

Trojan.Spy.Ursnif.F Trojan.Spy.Ursnif is a Trojan malware designed to steal information and compromise the infected system. The Trojan is known to take snapshot of processes and latches on to the browser. All major browsers from Chrome and Firefox to Opera and Safari are affected by this Trojan. It connects to a remote server giving different host

Trojan.Spy.Ursnif.F

Trojan.Spy.Ursnif.F Trojan.Spy.Ursnif is a Trojan malware designed to steal information and compromise the infected system. The Trojan is known to take snapshot of processes and latches on to the browser. All major browsers from Chrome and Firefox to Opera and Safari are affected by this Trojan. It connects to a remote server giving different host

Win32/AutoRun.AAK

Win32/AutoRun.AAK Win32/Autorun.AAK also goes by the name W32.Silly.DC & Trojan-PSW.Win32.VB.qe and is a worm. This worm spreads via removable media and contains a URL (Uniform Resource Locator) address. It drops services.exe or unisntlv32.exe files in the temp folder when executed. The worm is executed every time the infected media is connected to the computer. Of

Win32/AutoRun.AAK

Win32/AutoRun.AAK Win32/Autorun.AAK also goes by the name W32.Silly.DC & Trojan-PSW.Win32.VB.qe and is a worm. This worm spreads via removable media and contains a URL (Uniform Resource Locator) address. It drops services.exe or unisntlv32.exe files in the temp folder when executed. The worm is executed every time the infected media is connected to the computer. Of

Trojan.Spambot.AZ

Trojan.Spambot.AZ Trojan.Spambot.AZ is a Trojan which deletes wscsvc (Security Center service which displays notifications about the firewall and antivirus software installed), wuauserv (Auto Update Service) and other such important system files. It also deletes the registry keys in order to render the antivirus ineffective. This is probably one of the reasons why this virus comes

Trojan.Spambot.AZ

Trojan.Spambot.AZ Trojan.Spambot.AZ is a Trojan which deletes wscsvc (Security Center service which displays notifications about the firewall and antivirus software installed), wuauserv (Auto Update Service) and other such important system files. It also deletes the registry keys in order to render the antivirus ineffective. This is probably one of the reasons why this virus comes

Trojan.Poweliks

Trojan.Poweliks Trojan.Poweliks is Trojan virus usually affecting the Windows core systems. It is premeditated to carry out a set of commands once it enters the system. The virus copies itself in the system files to be activated every time the system is rebooted. It usually installs adware and redirects the browser to advertising sites against

Trojan.Poweliks

Trojan.Poweliks Trojan.Poweliks is Trojan virus usually affecting the Windows core systems. It is premeditated to carry out a set of commands once it enters the system. The virus copies itself in the system files to be activated every time the system is rebooted. It usually installs adware and redirects the browser to advertising sites against

Call DP Tech Group for your business IT needs. 630-372-0100

Give us a call or fill out our contact form for a quote.

Scroll to Top