Expert Virus Removal Services and Technical advice.

We are Providing Computer users with Expert Virus Removal Services and Technical Advice.

Threats and their Removal.

Do you need a quick solution to a technical problem? With our live remote-assistance tool, a member of our support team can view your desktop and share control of your mouse and keyboard to get you on your way to a solution.

Spywares and their Removal.

Are you worried that your computer might be nfected with Spywares? Then this is were you can find Support.

Advices for Protecting the Computer.

Expert Advices for Protecting your computer from attacks from all threats

Different Anti Virus Software and Tools.

Familiarizing different Anti Virus Software and removal Tools.

January 22, 2011

Multiple Malware

There are instances where more than one malware infecting at a same time because of many vulnerabilities and many ways that different malware can attack on a PC. It leads to severe situations and that will crash the PC entirely. There is one particular exploit that brings all the malware and trojans at a time HTML_SHELLCOD.SM that exploits CVE- 2010 3962 and because of which following trojans and malware attack the PC:

HTML_SHELLCOD.SM, a recently discovered malware that took advantage of a certain vulnerability in Internet Explorer (IE) and after all these infections infect the system and it many eagle-eyed cybercriminals look to further to inject their malicious money-making machinations that exploits all of the vulnerabilities present in the most efficient way possible.

Once HTML_SHELLCOD.SM has successfully taken advantage of the Uninitialized Memory Corruption Vulnerability (CVE-2010-3962) in IE, it connects to various URLs to download other malicious files detected as TROJ_LAMECHI.D, JS_EXPLOIT.ADA, JS_EXPLOIT.SM1, HTML_SHELLCOD.SM, TROJ_DLOADER.DAM, TROJ_GAMETHI.FMS, PE_PARITE.A, and TSPY_ARDAMAX.HR onto the affected systems.

This malware can render an infected system unusable.and puts the user’s confidential information at risk if another malware with backdoor capabilities affect the system. For instance, TROJ_GAMETHI.FMS, one of the malware HTML_SHELLCOD.SM downloads, steals user names and passwords related to popular online games such as Maple Story, Dungeon Fighter, Ragnarok Online, and World of Warcraft and can compromise the user accounts.

TSPY_ARDAMAX.HR will drop a file named TROJ_GAMETHI.FMS which drops more files on the infected system.  It also logs keystrokes and accesses certain sites and hacks chat logs which compromises user's privacy by stealing usernames and passwords. TROJ_GAMETHI.FMS terminates processes and downloads component files.

 PE_PARITE.A is a malware that infects .exe and .scr fils and spreads the entire network drives by choosing a port.

Users can prevent this threat by updating their operating system with all the available patches and updating their anti-virus with latest updates. Scan the PC with the updated Malware by disabling system restore, it will remove the threat.


Dialers dial to predefined numbers to connect to certain sites. Many users run dialers without knowing that some of these programs actually dial long distance numbers or connect to pay-per-call sites in any browser; and that they are being charged for the calls. Dialers are often offered as programs for accessing adult sites.

Symptoms Of Malware

Malware is the short form of malicious software, is a software designed to secretly access a computer system without the owner's consent or knowledge. Malware includes computer viruses, worms, trojan horses, spyware, dishonest adware, scareware, crimeware, most rootkits, and other malicious and unwanted software or program that will



RootkitRevealer is an advanced rootkit detection utility. RootkitRevealer successfully detects many persistent rootkits including AFX, Vanquish and HackerDefender.

Related Posts Plugin for WordPress, Blogger...

Search This Blog



There was an error in this gadget
Twitter Delicious Facebook Digg Stumbleupon Favorites More