Notice: Undefined index: HTTP_ACCEPT_LANGUAGE in /home/digit/public_html/perth/virus-removal.php on line 28
Virus Removal Perth - PC Security
  • Virus Removal

  • Email a Security Query
  • Phone 9371 0656
    Mob 0405 119 483



We can provide an OnSite same day service to eradicate your desktop , laptop or tablet computer of viruses.

The most common infections that I see are the UKASH Virus and Fake AV antivirus software and both are designed to lock you from your computer until a sum of money is paid. The UKASH virus typically delivers a screen stating your computer has been locked by the Australian Federal police and the Fake AV software usually insists their are other bugs on your machine and the only way to remove is to buy the product. In boths cases you SHOULD NEVER give them money.

Typically machines infected in this way have inactive Anti-Virus software or free software such as AVG. The method of infection usualy comes from visiting compromised websites which have been infected by the Blackhole Exploitation Kit. If you browse the web with Internet Explorer then its more likely than not vulnerable add-ons to Internet Explorer such as Java , Flash and Adobe Reader have been compromised.
The way around this is to get complete protection from an Internet Security package such as Kaspersky.

Website DisInfection


There are many Wordpress websites which are being targeted to deliver these exploits and we can offer a complete cleansing of these sites from infection and advise on how to avoid such attacks.

Latest Threats

Trojan-Downloader.JS.Agent.gdn
If your computer has not been protected with anti-virus software and has been infected with malware
Trojan.Win32.Scar.dgje
A trojan program. It is a Windows application (PE-EXE file). 742912 bytes.
Trojan.Win32.KillAV.gcg
The malicious library exports the function which leads to the following actions being carried out.If the system launches the quotavp.exequot process, the trojan tries to download the following...
Trojan.Win32.Agent2.dmdi
The malicious library is a component of a trojan program designed to steal the user's authentication data.
Trojan-Downloader.JS.Agent.gbj
A trojan program that uses the vulnerabilities in Oracle Java and Adobe Reader/Acrobat products to download and launch other malware.
Trojan-Downloader.JS.Agent.gaf
A trojan program that uses the vulnerabilities in Oracle Java and Adobe Reader/Acrobat products to download and launch other malware.
Trojan.Win32.Jorik.Carberp.ar
A trojan that provides the attacker with remote access to the infected computer. It is a Windows application (PE-EXE file). 176640 bytes. UPX packed.
Trojan.Win32.Agent2.dmvt
After launching, the trojan checks for the following branch in the system If the branch is missing, it...
Trojan.Win32.KillFiles.afz
A trojan program designed to delete components of the security software Gbuster plugin for Internet Explorer. Implemented in the form of an NT kernel mode driver. 5632 bytes. Written in C++.
Trojan.Win32.Agent.fajk
A trojan program that downloads files from the Internet without the user's knowledge and launches them.
Trojan.Win32.Jorik.Buterat.dp
A trojan program that carries out destructive actions on the user's computer.
AdWare.Win32.Gamevance.hfti
Adware designed to redirect user searches to other web resources. It is a Windows application (PE-EXE file). 1135840 bytes. Written in C++.InstallationThe trojan is installed as an add-in for the...
Trojan-Downloader.Win32.Small.bven
A trojan program that downloads files from the internet without the user's knowledge and launches them. It is a Windows application (PE-EXE file). 7168 bytes. Written in C++.InstallationWhen...
Trojan.NSIS.Miner.a
A trojan program. It is a Windows application (PE-EXE file). 244927 bytes. This malware is created using the system to create the installation packages Nullsoft Scriptable Install...
Trojan.Java.Agent.an
A trojan program that downloads files from the Internet without the user's knowledge and launches them. It is a JAR-archive containing a set of Java-classes (class-files). 15661 bytes.
Exploit.JS.CVE-2010-4452.t
After launching the malicious HTML-document, using Java Script tools
Trojan-Downloader.JS.Agent.gcv
After opening the malicious HTML page in the browser, it displays the following message using Java Script, the trojan collects system information, in particular:The type of OS...
Trojan-Dropper.Win32.StartPage.eba
If the path to the trojan file does not contain a sequence of symbols, the trojan will retrieve a script from its body and will launch this script under the following
Trojan-Dropper.Win32.Agent.ezqm
A trojan program that installs and launches other software on the infected computer without the user's knowledge. It is a Windows application (PE-EXE file). 231124 bytes. Written in C++.
Trojan-Downloader.Win32.VB.aiqx
When launching, the trojan downloads a file from the internet using the following .


Computer Security

The discovery of vulnerabilities in Operating Systems and browsers and their exploitation by disreputable programmers has become an industry however many INTERNET SECURITY suites are either inappropriate for the application, consume too much resources.
  • Internet Security

    Rather than just Virus Checking its important to to have a Total INTERNET SECURITY package which should perform the following;
  • File Scanning
    Scans all Local, Network & Removable drives for viruses and spyware.
  • Mail Scanning
    Scans all incoming,outgoing emails.
  • Web Anti-Virus
    Scans all web traffic (TCP port 80) for viruses. Blocks all dangerous scripts (javascript, Active X)
  • Proactive Defense
  • Checks all programs for the following;
    • Dangerous behaviour
    • Process Intrusion
    • Rootkit Detection
    • Hooks into the O.S.
    • Keylogger detection
    • Suspicious Activity
  • Network Traffic Monitoring
    Kaspersky can be configured to monitor all Network Ports for suspicious activity eg a Keystroke Logger program trying communicate its results to external Source.



For a free assessment please call or email.