JS:ScriptSH-inf Trojan

JS:ScriptSH-inf Trojan

JS: ScriptSH-inf Trojan is a generic detection for a harmful JavaScript file that is normally used by malware author to distribute a copy of fake programs. The threat may also be identified with files .html, .php, and .asp that contain an encrypted JavaScript on the header. This is automatically generated by malware after it penetrates a web site. More

Trojan Prorat

Trojan Prorat is a computer threat that uses backdoor function to allow a remote attacker to gain access on the infected PC. The Trojan can terminate any running security software such as anti-virus and firewall. Trojan Prorat also contacts a remote server and downloads other malware, which it also executes on the computer. More

VirTool:INF/Autorun.gen!F

VirTool:INF/Autorun.gen!F

VirTool:INF/Autorun.gen!F is a traditional detection for a harmful version of “autorun.inf” file. Computer viruses and trojan drops this file for specific purposes. The file is made to instantly run a malware file taking advantage of Windows’ autorun feature. This action leads to malware execution or installation of rogue products. You must realize that there are legal copies of autorun.inf file that are normally found on legitimate discs. More

JS:Trojan.Script.AAR

JS:Trojan.Script.AAR

JS:Trojan.Script.AAR is a detection for a risky JavaScript file contained within web pages. This JavaScript Trojan may are usually found on malicious web sites, and is made with the sole purpose of harming visitor’s computer. Among the hazard that JS:Trojan.Script.AAR can bring into the PC are browser redirection, Trojan download, and backdoor access. More

Exploit:JS/Blacole

Exploit:JS/Blacole

Exploit:JS/Blacole is a term used by antivirus program to identify a threat consisting of malicious JavaScript. It intends to load and initiate a series of attack on the target computer. Outdated programs are the main target of Exploit:JS/Blacole. It attempts to find security flaw on certain software and take advantage of it to infiltrate a computer. The malware then download more malware from a distant server. More

My Total Search

My Total Search

My Total Search is a browser hijacker that will set Internet browser’s home page to resolve to an address mytotalsearch.com/home. It contains a working search box that we may say useful and yet annoying. Searching on this hijacker gives a fair result, however, user always complains of excessive ads involving in the result page. Moreover, there are objection of its drive in redirecting search result to harmful web sites. More

FunWeb Products

FunWeb Products

FunWeb Products is an adware program that will show advertisements on the computer. Most of the time pop-up ads and browser redirects are harmless. However, there is an observation that Win32:FunWeb may bring great danger to the infected computer by hijacking the browser and redirect it to a malicious web sites. Contents of the sites can be malware, spyware, or codes that can drop several malware on visitor’s computer. It is detected by some anti-virus program as Trojan.Funweb.A or AdWare.Win32.FunWeb. More

FBI Online Agent – MoneyPak Malware

FBI Online Agent – MoneyPak Malware

FBI Online Agent that demands Moneypal payment to unlock your computer is a virus. This malware is part of a Trojan.Ransomlock.R family. It is common to many computer users to download free programs, so, malware authors are taking advantage of this habit. Files of FBI Online Agent MoneyPak virus are embedded into these free programs. More

W32.Extrat

W32.Extrat is a harmful Trojan that can allow a remote attacker to access the computer through backdoor channel. This threat may spread on removable drives as well as risky file-sharing networks, also known as peer-to-peer connection. The backdoor function of W32.Extrat allows an attacker to steal sensitive information including user name and passwords that are stored on the PC. More

W32/Patched.UC

W32/Patched.UC

W32/Patched.UC is a Trojan that instantly embeds harmful code to target file on the computer. It patches the said file in order to initiate a Trojan code each time that user runs the file. More often, the malware strikes on files that are routinely used by Windows. W32/Patched.UC also modifies various system files that open during Windows start-up or logon procedure. More