Computer virus is a broad range of threats that can harm the computer in distinctive ways. Each type of computer virus was made for specific purpose of attacking the system and attains its malicious objective.


Win32:Evo-gen is a detection for a malware that download and execute files into the computer. There are several variants of this virus, which perform different payload when executed. Though, most versions from Win32:Evo-gen has a backdoor function. Thus, remote attacker may gain access to the infected computer. Malware authors may also use this link to obtain sensitive data that are saved inside the compromised PC. (more…)

Fake FBI Warning

Fake FBI Warning that arises on computers these days is a harmful virus. It is probably the most widely-spread virus from Reveton family of malware. When this fake FBI Warning infiltrates a computer, you will notice that PC is inoperable. All you will see is a fake warning message stating, “Your computer has been locked.” You don’t need to be afraid of this warning, as stated, it is fake FBI warning message. (more…)

Remove “Unlock this Page. Complete an offer to continue”

A virus infection on your computer may show a message “Unlock this Page. Complete an offer to continue.” It is another desktop-locking Trojan similar to Police ransomware threats. Although, this new threat will not demand for ransom but rather force you to fill a survey and browser online offer before it can unlock the desktop. It will display the following message: (more…)


Win32:MalOb-KF is a generic detection for a virus that intends to hide the malicious code by using a tool not commonly used by software makers. The virus can allow remote attackers to gain control of the computer. In most cases, Win32:MalOb-KF further harms the PC when it downloads other malware from a remote location. (more…)


Win32/Alman is a virus that discretely injects a malicious code into a program or data files. Similar to any threat, this one also spreads by infecting other files on the system and initiates on its own. Presence of Win32/Alman may be stealth and undetected by some antivirus program. Especially if a software’s database is obsolete. This virus applies a rootkit function to remain hidden once inside the computer. (more…)

MBR:SST Rootkit

MBR:SST Rootkit Detection

MBR:SST Rootkit is a harmful virus that attacks the master boot record of the infected computer. This virus has stealth capability. It can evade installed antivirus program by injecting its code to system processes. MBR:SST Rootkit also creates a Windows service and run on its own each time you start the PC. Altering the registry on Windows system is alternative way to load the virus instantly on boot-up. (more…)


HTML:RedirBA-inf is a generic detection for a malicious HTML files. Files identified as HTML:RedirBA-inf contains harmful script that can redirect Internet browser to unknown web sites. The threat may also change various settings on the affected computer in order to manipulate search results and point it to a risky web address. The main goal of this virus is to download more threats on victim’s computer. (more…)


Exploit:JS/Blacole.GB is the name given to an identified file that is part of the Blackhole exploit kit. This kit is use by malware authors to deploy Trojans, viruses, and adware. This threat will attempt to take advantage of weakness and security holes in Java, Adobe Acrobat, and Adobe reader programs. An exposure to Exploit:JS/Blacole.GB may lead to a download and execution of more malware. (more…)


VBS:Malware-Gen is a heuristic detection for a malicious Visual Basic Script file. Due to the vast component of this threat, several Trojans, viruses, and worms can be one of them. In most instances, VBS:Malware-Gen variants are developed to automatically load a file into the computer. In this case, you need to find and delete the file before it can further harm your PC. (more…)