Top of Page
Skip main navigation

Virus Information

For information on viruses, you can contact us at virushelp@nova.edu . You can also check the following sites listed below online for more information.

Check for Viruses

If you suspect that you have a virus on your computer and would like to scan your computer you can go to Trend Micro HouseCall. This is a free service provided by Trend Micro.

Virus Information

Hoax Information

Trend Micro Security Advisories

  • Trojan.X97M.PANDASTEAL.THDABBA - Threat type: Trojan Aliases: HEUR:Trojan-Downloader.MSOffice.Agent.gen (KASPERSKY) Platforms: Windows Overall Risk Rating: Low Damage Potential: Medium Distribution Potential: Low Reported Infection: Low Information Exposure: Low Overview: This is the Trend Micro detection for macros that drop the cryptocurrency wallet stealer known as Panda stealer. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
  • TrojanSpy.MSIL.REDLINESTEALER.YXBDM - Threat type: Trojan Spy Aliases: MSIL/Kryptik.AAHQ!tr(FORTINET); Trj/GdSda.A(PANDA) Platforms: Windows Overall Risk Rating: Low Damage Potential: Medium Distribution Potential: Low Reported Infection: Low Information Exposure: High Overview: This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive information.
  • TrojanSpy.MSIL.REDLINESTEALER.YXBDN - Threat type: Trojan Spy Aliases: a variant of MSIL/Kryptik.AAHN trojan(NOD32); PWS-FCXD!F291EAD13EAD(NAI) Platforms: Windows Overall Risk Rating: Low Damage Potential: Medium Distribution Potential: Low Reported Infection: Low Information Exposure: High Overview: This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive information.
  • Ransom.Win64.ASTROLOCKER.THCBDBA - Threat type: Ransomware Aliases: Win64/Filecoder.CI trojan (Nod32), Trojan-Ransom.FileCrypter (Ikarus) Platforms: Windows Overall Risk Rating: Low Damage Potential: High Distribution Potential: Low Reported Infection: Low Information Exposure: Low Overview: This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes then deletes itself afterward.It drops files as ransom note. It avoids encrypting files with the following file extensions.
  • Ransom.Win32.DEARCRY.THCABBA - Threat type: Ransomware Aliases: Ransom:Win32/DoejoCrypt.A (MICROSOFT) Platforms: Windows Overall Risk Rating: Low Damage Potential: High Distribution Potential: Low Reported Infection: Low Information Exposure: Low Overview: This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Return to top of page