Author Archives: ThreatSupport.Com

VIEW ALL

3 Steps to Remove Hot-Finder.Com

Hot-Finder.Com is a piece of software commonly known as PUP (Potentially Unwanted Program). Often bundled and installed along with free software, this program…
Continue reading

Beware of Free Software

If the grocery store told you ”Come to our store, everything is FREE!” would you think it’s real or would you look for…
Continue reading

How to Remove iStartSurf.Com

iStartSurf is a piece of software commonly known as PUP (Potentially Unwanted Program). Often bundled and installed along with free software, this program…
Continue reading

Trojan Viruses – Basic Manual Removal Guide

Nearly all regular computer users know about Trojan horse viruses and their effect on computers. A Trojan virus is basically a virus which…
Continue reading

What are Rootkits?

Originally used in the 1990s to target UNIX operating systems, a rootkit is a special type of malicious software that penetrates your system…
Continue reading

Win32.Tescrypt

Threat Name: Ransom. Win32/Tescrypt Threat category: Ransomware Installation: This threat is dropped by the following viruses: Exploit:SWF/Axpergle Exploit:JS/Neclu JS/Fiexp JS/Anogre Files dropped by…
Continue reading

Win32/Nitedrem.E

Threat Name: Ransom: Win32/Nitedrem.E Category: Trojan.Downloader Installation: This threat uses injection code via running processes Threat Description: Trojan Downloaders are engineered to download…
Continue reading

Threat Finder

Threat Name: Ransom:Win32/Threatfin Category: Ransomware Installation: has been installed via the Backdoor:Win32/Bedep virus Location where this threat is usually dropped: %TEMP% \ie2.dl %TEMP%…
Continue reading

What are Hacktools and How to Remove Them

Hacktool viruses are tools specially designed and used by hackers (or unauthorized users) to spread malicious Trojans, worms, siffers and viruses; they gain…
Continue reading

What Are Exploits And How to Remove Them

Currently ranked as 48th in the world of online malware, an exploit is malicious software that commands to ‘exploit’ any weaknesses (which can…
Continue reading