Click on screenshot to zoom
Danger level 6
Type: Trojans
Common infection symptoms:
  • Installs itself without permissions

Trojan.Katusha

Life online has just become a tad more complicated. As a computer user, you will need to ensure you keep up-to-date with all parasites. Trojan.Katusha is one of the latest Trojan infections to be wreaking its malicious havoc on the World Wide Web.

Trojan.Katusha is malware designed solely to compromise the integrity of any system is has infiltrated.

Trojan.Katusha, as a typical Trojan infection tends to infiltrate a system via security or browser exploits and is usually unseen once in the system.

Upon installation, Trojan.Katusha will carry out its harmful functionality, and will only compromise the system it has infiltrated.

Trojan.Katusha may work in conjunction with various other malware applications.
Important to bear in mind is the fact that once embedded within a computer system, Trojan.Katusha may gather personal, financial and banking information stored on the system, and allow an outside remote controller access to this gathered information.

In order to protect your system against the threat of Trojan.Katusha and the likes of, there are 4 main rules you should always adhere to:

• Rule 1:
Keep your Windows up to date.
(Tip: Regularly visit Windows Update and set your PC to receive security and critical updates automatically)

• Rule 2: Download and install a reliable anti-spyware program, one that will recognise the current form of Trojan.Katusha, a well as other forms of spyware.

• Rule 3: Install a firewall onto your system, and keep it turned on. A firewall is essential for complete protection for your system.

• Rule 4: Keep the definitions in your anti-spyware up to date at all times.

A good way to ensure your system remains safe and secure is highlighted below; you should follow these steps to prevent PC threat invasions:

• Enable a firewall on your computer.
• Get the latest computer updates for all your installed software.
• Use up-to-date antivirus software.
• Use caution when opening attachments and accepting file transfers.
• Use caution when clicking on links to web pages.

Manual detection and removal of Trojan.Katusha is not recommended, as it could further damage the computer system.

To avoid any unneeded risks of damage to your computer system, it is highly recommended to utilize a reliable and legitimate anti-spyware application, to remove Trojan.Katusha and all its components from the infected computer system.

Download Spyware Removal Tool to Remove* Trojan.Katusha
  • Quick & tested solution for Trojan.Katusha removal.
  • 100% Free Scan for Windows
disclaimer

How to manually remove Trojan.Katusha

Files associated with Trojan.Katusha infection:

winexplorer.dll
system.exe
svchost.exe
Mcojoa.exe
winexplorer.dll
wincontrol.dll
vumomate.dll
system.exe
svchost.exe
ohydy.exe
msxmlm.dll
5refc1e5.exe
dwtrig20microsoft.exe
79F.tmp
GdgH.exe
msupdt.exe
awsocmnrex.exe
notepad.dll
win32extension.dll
Free KLP.exe
msxmlm.dll
vumomate.dll
dwtrig20microsoft.exe
wincontrol.dll
79F.tmp
win32extension.dll
5refc1e5.exe
ohydy.exe
Mcojoa.exe
notepad.dll

Trojan.Katusha DLL's to remove:

vumomate.dll
wincontrol.dll
win32extension.dll
winexplorer.dll
wincontrol.dll
vumomate.dll
msxmlm.dll
notepad.dll
win32extension.dll
notepad.dll
winexplorer.dll
msxmlm.dll

Trojan.Katusha processes to kill:

Free KLP.exe
system.exe
dwtrig20microsoft.exe
Mcojoa.exe
system.exe
svchost.exe
ohydy.exe
5refc1e5.exe
SearchSettingsProtection.exe
dwtrig20microsoft.exe
GdgH.exe
msupdt.exe
awsocmnrex.exe
5refc1e5.exe
Mcojoa.exe
svchost.exe
ohydy.exe

Remove Trojan.Katusha registry entries:

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser HelperObjects\{6551001F-A07B-40B1-8F55-B44BF35A42A6}
Software\Microsoft\Internet Explorer\Toolbar\WebBrowser "{4AFC04A3-B551-4B68-9BEB-8677D90150D9}"
HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionExplorerBrowser HelperObjects{A77D3539-581D-450C-9E44-A84C415A6172}
RUNNING PROGRAM\Explorer.EXE
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\ lsdefrag
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWSNT\CURRENTVERSION\WINLOGON\USERINIT\ userinit
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\ GdgH
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\ ReaderModule
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\ SubscriberSENS11.0.8160
Disclaimer

Post comment — WE NEED YOUR OPINION!

Comment:
Name:
Please enter security code:
This is a captcha-picture. It is used to prevent mass-access by robots.