Spyware and Malware Removal

 
Recent Posts
Free Scanners
How to Prevent Spyware
Spyware and other unwanted software can invade your privacy, bombard you with pop-up windows, slow down your computer, and even make your computer crash. Here are several ways you can help protect your computer against spyware and other unwanted software. more >>
Microsoft Security Updates
As part of Microsoft's routine, monthly security update cycle, today we released two new security updates. more >>
Protecting Your Computer
Here are 4 basic steps to protect your computer against attacks and threats. more >>
Minimizing the Risk
Using Internet communication tools such as chat rooms, e-mail, and instant messaging can put children at potential risk of encountering online predators. more>>

New Malware.fi

Saturday, July 21, 2007
New Malware.fi is a heuristic detection which may detect either viruses or trojans. If a sample is detected as New Malware.fi then it is likely that the system is currently infected and has virus or trojan processes running.


Symptoms:
Symptoms of malware vary greatly. Some common symptoms which may be observed in the case of New Malware.fi detections are as follows.

  • Unknown processes are running.
  • Unknown ports are open.
  • Reduced system performance


How to Remove New Malware.fi:
Please use the Typical Threat Removal. Click here

posted by hitech-leiza @ Saturday, July 21, 2007   0 comments

Shavr

Shavr copies itself to the root of the system drive and to the system folder. An autorun.inf file is also created in the root of the system drive. This causes a double-click on the drive letter in Windows Explorer to launch another instance of the Trojan.

Symptoms:
Forced shutdown occurs between 14:00 and 15:00 local system time. Unable to launch Task Manager or Registry Editor.

How to Remove Shavr:
Please use the Typical Threat Removal. Click here
posted by hitech-leiza @ Saturday, July 21, 2007   0 comments

W32/Bagle.fm.dldr

W32/Bagle.fm.dldr is a virus downloader detection. Viruses are programs that self-replicate recursively, meaning that infected systems spread the virus to other systems, which then propagate the virus further. While many viruses contain a destructive payload, it's quite common for viruses to do nothing more than spread from one system to another.

Symptoms:
Once executed the trojan, it will pretend to be the software crack and pops up the window with title "Select file to crack"

How to Remove W32/Bagle.fm.dldr:
Please use the Typical Threat Removal. Click here
posted by hitech-leiza @ Saturday, July 21, 2007   0 comments

Downloader-BDC

Downloader-BDC can download additional threat from a remote website.

Symptoms:
The computer will try to contact http://s2.bestmanage.org. Some files with a name generated as explained previously may be found in the temp folder

How to Remove Downloader-BDC:
Please use the Typical Threat Removal. Click here
posted by hitech-leiza @ Saturday, July 21, 2007   0 comments

GPCoder.h

GPCoder.h is a detection for a ransomware trojan. It encrypts files on the harddrive, creates a text-file indicating what has happened, and gives email addresses to send the ransom money to.

Symptoms:
File types mentioned previously, overwritten with "garbage" (encrypted data). Presence of aforementioned read_me.txt files.

How to Remove GPCoder.h:
Please use the Typical Threat Removal. Click here
posted by hitech-leiza @ Saturday, July 21, 2007   0 comments

WinCE/Exploit-SMIL

WinCE/Exploit-SMIL is an exploit for a vulnerability in the MMS client on Windoes CE 4.2 devices.

Symptoms:
The Exploit attempts to display a message box on the display with the following message:
“MMS g0t Y0u 0WnD!!Y0U got 0WND”

How to Remove WinCE/Exploit-SMIL:
Please use the Typical Threat Removal. Click here
posted by hitech-leiza @ Saturday, July 21, 2007   0 comments

J2ME/Backdoor.client

J2ME/Backdoor.client is a client for a trojan named Generic Backdoor. It is capable of running on devices that are MIDP 2.0 and CLDC 1.1compatible. Such devices include many Smartphones.

Symptoms:
J2ME/Backdoor.client does not have a mobile payload. It is instead used to perform actions on the targeted computer.

How to Remove J2ME/Backdoor.client:
Please use the Typical Threat Removal. Click here
posted by hitech-leiza @ Saturday, July 21, 2007   0 comments

Exploit-IEFF

Exploit-IEFF is likely to be delivered when viewing a website hosting the malicious code.

How to Remove Exploit-IEFF:
Please use the Typical Threat Removal. Click here
posted by hitech-leiza @ Saturday, July 21, 2007   0 comments

PWS-Banker.gen.ac

PWS-Banker.gen.ac has been spammed via an email which purports to be information on the recent Brazilian airplane crash. The email contains a link which, when clicked, goes to a bank password stealer.

Symptoms:
The Trojan is running in the process list. Mails may be sent using Outlook in some instances, or network traffic on port 25, connecting to a remote SMTP (mail) server to send email data to the malware author. Infected user might be prompted to enter their online banking credentials after running the malware.

How to Remove PWS-Banker.gen.ac:
Please use the Typical Threat Removal. Click here
posted by hitech-leiza @ Saturday, July 21, 2007   0 comments

W32/Mytob.gen@MM

W32/Mytob.gen@MM self-replicate recursively, meaning that infected systems spread the virus to other systems, which then propagate the virus further. While many viruses contain a destructive payload, it's quite common for viruses to do nothing more than spread from one system to another.

Symptoms:
The Sdbot functionality in the worm is designed to contact the IRC server named, irc.blackcarder.net , join a specified channel, and wait for further instructions. This bot can accept commands to download and execute other programs. The bot also contains code to spread via the LSASS exploit

How to Remove W32/Mytob.gen@MM:
Please use the Typical Threat Removal. Click here
posted by hitech-leiza @ Saturday, July 21, 2007   0 comments

JS/Downloader-AUD

Friday, July 20, 2007
JS/Downloader-AUD spread manually, often under the premise that they are beneficial or wanted. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Distribution channels include email, malicious or hacked web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc.

Symptoms:
Upon execution, the trojan attempts to download files from www.dougansss.com


How to Remove JS/Downloader-AUD:
Please use the Typical Threat Removal. Click here
posted by hitech-leiza @ Friday, July 20, 2007   0 comments

W32/Stration.gen.dldr

W32/Stration.gen.dldr is a downloader that are designed to pull files from a remote website and execute the files that have been downloaded.

Symptoms:
Many of these Downloaders install other malware including viruses as well as other Trojans.
Additionally many of them are used to remotely install Adware packages onto the affected host machine for the purposes of gaining referral revenue from the Adware software vendor.

How to Remove W32/Stration.gen.dldr:
Please use the Typical Threat Removal. Click here
posted by hitech-leiza @ Friday, July 20, 2007   0 comments

Downloader-BAI!M711

Downloader-BAI is a trojan that is delivered via a spammed email message. This downloader is designed to download files from websites controlled by the malware author.

Symptoms:
Comes in email with the following subject:
Subject: Love for Granted
Subject: Most Beautiful Girl
Subject: Puppy Love
Subject: Search for One
Subject: Magic of Flowers
Subject: Dinner Coupon

How to Remove Downloader-BAI!M711:
Please use the Typical Threat Removal. Click here


posted by hitech-leiza @ Friday, July 20, 2007   0 comments

Exploit-ANIfile.c

Exploit-ANIfile.c covers detection of ANI files that attempt to exploit a recent ANI file format handling vulnerability. AVERT has confirmed that the exploit affects at least systems running Microsoft Internet Explorer 6 & 7 on Windows XP SP2.

Symptoms:
This exploit runs silently without showing any obvious symptoms. This exploit is simply a transport mechanism for other malicious code; whatever the attack chooses to include.

How to Remove Exploit-ANIfile.c:
Please use the Typical Threat Removal. Click here
posted by hitech-leiza @ Friday, July 20, 2007   0 comments

W32/Fujacks.aa

W32/Fujacks.aa is a copied variant of the W32/Fujacks worm that infects PE and possibly HTML files with malicious hyperlinks of Windows ANI 0-day exploit; and spreads over floppy drive and possibly other removable devices. It will also download additional malware on the infected machine.

Symptoms:
PE files increase in file sizes between 10k to 100k or more. HTML files may be appeneded with the mentioned hyperlinks. Unexpected connection to the mentioned server(s).

How to Remove W32/Fujacks.aa:
Please use the Typical Threat Removal. Click here
posted by hitech-leiza @ Friday, July 20, 2007   0 comments

Phish-BuyPhony

Phish-BuyPhony is an Internet Explorer Browser Helper Object (BHO) maliciously designed to hijack well known websites to steal money by masquerading Apple's iPhone on-line shop. When successful, the victim is brought to a fake site where payment is made to the crooks via Western Union or MoneyGram.

Symptoms:
Loading of phishing website instead of the official vendor website from www.iphone.com.Loading of phishing website instead of the official vendor website from www.iphone.com.

How to Remove Phish-BuyPhony:
Please use the Typical Threat Removal. Click here
posted by hitech-leiza @ Friday, July 20, 2007   0 comments

W32/Autorun.worm.g

W32/Autorun.worm.g is a worm which attempts to spread to removable drives by creating an Autorun.inf file, which will run the worm automatically, if systems which use the removable drive are set to Autorun.

Symptoms:
The infected system becomes drastically changed, with references to Harry Potter. User profiles, as mentioned previously, appearing unexpectedly

How to Remove W32/Autorun.worm.g:
Please use the Typical Threat Removal. Click here
posted by hitech-leiza @ Friday, July 20, 2007   1 comments
Free Stuff

Ads
Sidebar
Archives
Powered by

Free Blogger Templates

BLOGGER

© Spyware and Malware Removal Template by Isnaini Dot Com