Showing posts with label get rid of trojan. Show all posts
Showing posts with label get rid of trojan. Show all posts

Monday, February 1, 2016

How to Remove Generic HTool.b (C:\Windows\SECOH-QAD.dll) from Infected PC?

I have received a notice from my McAfee Antivirus program saying that the Program named Generic HTool.b is a potentially unwanted program. It has quarantined the file from C:\Windows\SECOH-QAD.dll. It is asking me if I want to remove the program. Can anyone tell me what program this is?

What is Generic HTool.b?


Generic HTool.b is detected as a potentially unwanted program by McAfee Antivirus. It is not a virus or Trojan, but it can still infect your computer to disrupt its normal functioning without your knowledge. To live with this Generic HTool.b, you may get the symptoms listed below:

Monday, January 11, 2016

Eliminate Trojan:Win64/Patched.AZ.gen!dll Completely From Infected PC

I foolishly picked up a Trojan virus (Trojan:Win64/Patched.AZ.gen!dll) on my media PC a few nights ago and, after some battling, managed to remove all the software it added, and regain access to the internet. However, I was unable to remove the virus from the dnsapi.dll file. Please anyone help me?

Trojan:Win64/Patched.AZ.gen!dll Description


Trojan:Win64/Patched.AZ.gen!dll is a severe Trojan infection that can affect many Windows computers. It is often distributed via spam emails, pornographic websites, free application downloads, and other social network services. So this Trojan horse usually invades your computer without your knowledge. Once you find it in your computer, you should take immediate actions to deal with it or it will seriously damage your system.

Tuesday, November 17, 2015

How to Remove Troj/Vundo-MemA from Computer Completely?

Your computer has been infected by Troj/Vundo-MemA? Need help erase this detection before it damages your computer? Please read more to learn how to get rid of it.

What is Troj/Vundo-MemA?


Troj/Vundo-MemA is detected as a severe Trojan horse that may download files to your computer and mess up your system. It often comes into your computer stealthily because it is distributed via spam email, peer-to-peer file sharing, drive-by downloads, and by other malware. After infiltration, it makes use of advanced technique to avoid the scanning and removing of some antiviruses. You should remove it as detected otherwise it may bring a series of problems to your computer. For example: