3
votes
Accepted
Trojan:Win32/Wacatac.B!ml found in C:\$Extend\$Deleted
Detected: Trojan:Win32/Wacatac.B!ml
This is very often a false positive. In fact I can compile VB exes on my PC and Windows Defender will immediately try to delete/quarantine it with this detection. ...
3
votes
Accepted
How is it possible to be infected by a Trojan without downloading anything suspicious?
You may not have specifically intended to download any files or executables, but by browsing any website you are downloading hundreds of files of various different types.
If you were browsing a ...
3
votes
Accepted
Kaspersky detects Java.exe as a virus, is this a fault?
I did some Googling for you and it looks like Kaspersky seems to have a long standing problem with Java so it's possible it's a false positive.
Ultimately though it comes down to if you trust the ...
2
votes
Avast keeps showing this virus error
Looks like a malicious VBScript is hooked somehow to your WMI event system - that is what scrcons.exe is responsible for - see here.
Using a free version of MBAM is a good idea, I would start with ...
2
votes
Trojan virus threat 'removed or restored'
It means that it was removed from the quarantine area. Nothing more and nothing less.
For whatever reason the database they use to keep track of things apparently only tracks whether it is in ...
2
votes
Teraterm with trojan?
Likewise, I witnessed Windows Defender report a trojan in TeraTerm 4.91 available here. I believe that download of TeraTerm is safe and that the trojan detected was a false positive based on the ...
1
vote
Accepted
Format and encrypt compromised USB stick with TrueCrypt to make it clean again?
Your best option (if i understand well what you are trying) is to use a Linux to write zeroes all over the USB, then use gdisk or fdisk to create a new MBR or GPT empty table, after that treat it as a ...
1
vote
What��s the difference between rootkit and RAT?
From Kaspersky - A Malware Classification
Rootkit:
A rootkit is a special form of malware, designed specifically to hide its presence and actions from both the user and any existing protection ...
1
vote
What precautions to take after a trojan Win32/Occamy.C infection
First of all I applaud this:
I nuked the windows installation by formatting the disks.
Most people will try to wiggle their way out of it. And of course even this method isn't 100% secure, given ...
1
vote
Accepted
Can TrueCrypt like software protect my external HDD from virus in svhost.exe modify my files on it?
In this context, encryption will do nothing to secure your files. you need regular backups.
If a truecrypt volume is mounted at the time malware runs, and the user the malware is executing under has ...
1
vote
"Hiren's Boot CD 16.2" vs. "Hiren's Boot CD 15.2"
I am a qualified and experienced enterprise IT support engineer and my answer is provided with the confidence of having a title and pay rate for over 20 years in this focus area, and usually get paid ...
1
vote
Accepted
wired TCP/IP communication under system idle process
It's most likely a false positive, according to http://support.eset.com/alert5879/?viewlocale=en_US, you should update to virus signature database version 13103 or later. OR submit false positive ...
1
vote
Sure way to get rid of a trojan
If you have a virus, format the machine totally. If the image you're restoring from doesn't have the virus it's fine to proceed.
If another hard drive may be infected, you need to do the same thing - ...
Only top scored, non community-wiki answers of a minimum length are eligible
Related Tags
trojan × 125virus × 63
malware × 25
windows × 23
windows-7 × 19
security × 19
windows-10 × 12
anti-virus × 11
windows-xp × 8
virus-removal × 8
spyware × 7
networking × 4
ms-security-essentials × 4
avast × 4
google-chrome × 3
firefox × 3
usb × 3
firewall × 3
malware-detection × 3
worm × 3
linux × 2
boot × 2
router × 2
mac × 2
dns × 2