Win32.Nimnul

Win32.Nimnul is a dangerous trojan infection which creates a start-up registry entry to run automatically every time you start your computer. Win32.Nimnul changes Internet settings and redirects your web browser to unwanted websites. It may change your desktop background and adds strange web shortcuts to the desktop, which usually leads to advertisement web pages or adult websites. Win32.Nimnul is able to modify other files by infecting, pretending, or overwriting them…

Win32.Jeefo

is a malicious software that once it is executed has the capability of replicating itself and infect other files and programs. These type of malware, called Viruses, can steal hard disk space and memory that slows down or completely halts your PC. It can also corrupt or delete data, erase your hard drive, steal personal information, hijack your screen and spam your contacts to spread itself to other users. Usually,…

Win32/HLLP.Kuku

Win32/HLLP.Kuku logs keystrokes to certain windows making use of SYSLIB32.DLL which it first drops in the System or Temp folder. This keylog is then sent in emails using the virus’ own SMTP engine along with other detailed information gathered from the computer. Win32/HLLP.Kukuis a virus that also acts as a keylogger. On the 10-12th of the month, when the minute equals the hour, the following message is displayed with the…

Virus ‘Mal/Sality-D’

is an entry-point obscuring polymorphic file infector. It will infect executable files on local, removable and remote shared drives. The virus also creates a peer-to-peer botnet and receives URLs of additional files to download. It then attempts to disable security software. The family of threats has been around for some timeand may have originated in Russia. At that time, was a less complicated file infector, prepending its viral code to…

Multiplug-FNZ

is a malicious software that once it is executed has the capability of replicating itself and infect other files and programs. These type of malware, called Viruses, can steal hard disk space and memory that slows down or completely halts your PC. It can also corrupt or delete data, erase your hard drive, steal personal information, hijack your screen and spam your contacts to spread itself to other users. Usually,…

Gen:Variant.Jaik

Gen:Variant.Jaik copies its file(s) to your hard disk. File name typical to Trojan.Jaik is (randomname).exe. Then it runs itself and creates new startup key in registry with name Trojan.Jaik and value (randomname).exe. If you will look into running processes list you will see some extra process with name like (randomname).exe or any random name that uses decent amount of your CPU. Infection Symptons of will degrade the computer performance significantly…

Win32:SaliCode

is a malicious software that once it is executed has the capability of replicating itself and infect other files and programs. These type of malware, called Viruses, can steal hard disk space and memory that slows down or completely halts your PC. It can also corrupt or delete data, erase your hard drive, steal personal information, hijack your screen and spam your contacts to spread itself to other users. Usually,…

Downware.Morstar

often takes advantages of system loopholes to come bundled with adware, worms and malware. It also helps scamware extensions, plug-ins and ads-on to be installed in the computer automatically. triggers great troubles to net users. It may typically redirect your favorite websites to other harmful content and display random pop-up ads or messages on your screen. This is not a virus or Trojan. PUPs do not “infect” systems. They may be installed…

TROJ_CLIKUG

is a malicious programs that perform actions that have not been authorized by the user. Unlike computer viruses and worms , Trojans are not able to self-replicate. It can download and install new versions of malicious programs onto your computer – including Trojans and adware. is used by hackers in order to install Trojans and / or viruses – or to prevent the detection of malicious programs. Not all anti-virus…

HEUR/Malware.QVM

is a malicious programs that perform actions that have not been authorized by the user. Unlike computer viruses and worms , Trojans are not able to self-replicate. It can download and install new versions of malicious programs onto your computer – including Trojans and adware. is used by hackers in order to install Trojans and / or viruses – or to prevent the detection of malicious programs. Not all anti-virus…