{"id":74910,"date":"2011-07-01T11:40:04","date_gmt":"2011-07-01T10:40:04","guid":{"rendered":"http:\/\/www.spy-emergency.com\/research\/malware-database\/iexploreexe-httpjump123456790com99downtj1htm-iexploreexe-httpjump123456790com99downtj1-trojanwin32malware.html"},"modified":"2011-07-01T11:40:04","modified_gmt":"2011-07-01T10:40:04","slug":"iexploreexe-httpjump123456790com99downtj1htm-iexploreexe-httpjump123456790com99downtj1-trojanwin32malware","status":"publish","type":"post","link":"https:\/\/www.spy-emergency.com\/research\/malware-database\/iexploreexe-httpjump123456790com99downtj1htm-iexploreexe-httpjump123456790com99downtj1-trojanwin32malware.html","title":{"rendered":"iexplore.exe-http:\/\/jump.123456790.com:99\/down\/tj1.htm&#8211; &#8211; iexplore.exe-http:\/\/jump.123456790.com:99\/down\/tj1 &#8211; Trojan.Win32.Malware"},"content":{"rendered":"<p>\n<b>iexplore.exe-https:\/\/jump.123456790.com:99\/down\/tj1.htm&#8211;<\/b> is a process that is registered in our malware database as <b>Trojan.Win32.Malware<\/b>. Trojan.Win32.Malware is a Trojan. Software used to break into user system and grant access to the user data or perform malicious actions. To determine whether this file is a real <b>threat<\/b> or not, please run a <b>malware scan<\/b>.<\/p>\n<h4>Recommendation<\/h4>\n<p><strong>Deactivate and eliminate iexplore.exe-https:\/\/jump.123456790.com:99\/down\/tj1.htm&#8211; immediately. This process is commonly identified as a spyware, virus or trojan.<\/strong><\/p>\n<p>To remove Trojan.Win32.Malware Trojan from your PC please follow these steps:<\/p>\n<p>1, Download Spy Emergency AntiSpyware and AntiVirus by clicking on Download button bellow. <a href=\"https:\/\/www.netgate.sk\/download\/download.php?id=1\"> <\/a><br \/>\n<a href=\"https:\/\/www.netgate.sk\/download\/download.php?id=1\"> <img decoding=\"async\" src=\"https:\/\/www.spy-emergency.com\/research\/images\/downloadbutton.png\" alt=\"Free AntiSpyware AntiVirus Download\" \/> <\/a><\/p>\n<p>2, Install it and press Start button to start malware  scan.<br \/>\n3, When the scan is finished, press the Next button and  Remove button to clean  Trojan.Win32.Malware Trojan from your system.<\/p>\n<p><strong>Spyware \/ Malware Description:<\/strong><\/p>\n<h2>Trojan.Win32.Malware<\/h2>\n<table style=\"text-align: left; width: 100%;\" border=\"0\" cellspacing=\"2\" cellpadding=\"2\">\n<tbody>\n<tr>\n<td><strong>Type:<\/strong><\/td>\n<td>Trojan<\/td>\n<\/tr>\n<tr>\n<td><strong>Type Description:<\/strong><\/td>\n<td>Software used to break into user system and grant access to the user data or perform malicious actions.<\/td>\n<\/tr>\n<tr>\n<td><strong>File names:<\/strong><\/td>\n<td>iexplore.exe-https:\/\/jump.123456790.com:99\/down\/tj1.htm&#8211;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>iexplore.exe-https:\/\/jump.123456790.com:99\/down\/tj1.htm&#8211; is a process that is registered in our malware database as Trojan.Win32.Malware. Trojan.Win32.Malware is a Trojan. Software used to break into user system and grant access to the user data or perform malicious actions. To determine whether this file is a real threat or not, please run a malware scan. Recommendation Deactivate and eliminate [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[188],"tags":[128210,128209,29659],"class_list":["post-74910","post","type-post","status-publish","format-standard","hentry","category-malware-database","tag-iexploreexehttpjump123456790com99downtj1","tag-iexploreexehttpjump123456790com99downtj1htm","tag-trojanwin32malware"],"_links":{"self":[{"href":"https:\/\/www.spy-emergency.com\/research\/wp-json\/wp\/v2\/posts\/74910","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.spy-emergency.com\/research\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.spy-emergency.com\/research\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.spy-emergency.com\/research\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spy-emergency.com\/research\/wp-json\/wp\/v2\/comments?post=74910"}],"version-history":[{"count":0,"href":"https:\/\/www.spy-emergency.com\/research\/wp-json\/wp\/v2\/posts\/74910\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.spy-emergency.com\/research\/wp-json\/wp\/v2\/media?parent=74910"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.spy-emergency.com\/research\/wp-json\/wp\/v2\/categories?post=74910"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.spy-emergency.com\/research\/wp-json\/wp\/v2\/tags?post=74910"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}