W32.Sality.AE is a Trojan that modifies Windows registry to add an entry so that it can bypass installed firewall programs. Another payload of the virus is to download and execute additional threats from a remote server. W32.Sality.AE will spread on computers by infecting executable files on local and remote drives. It is so harmful that it can delete files that belong to security programs. More
Trojan.Rontokbro is a very harmful Trojan that will disable some Windows resources and performs distributed denial of service (DDoS) attacks on predefined web sites to hamper its operation. The Trojan may also drop other malicious files and create a bunch of registry entries that are essential for its operation. Presence of this Trojan may result to total devastation, it will delete all files and folders it can find on the compromised computer. More
Downloader.Almanahe is a computer Trojan that has a sole purpose of downloading other threat that belongs to W32.Almanahe group. After it successfully download the most recent version of the Trojan, it will initiate its own removal and delete itself from the affected computer. This Trojan possesses a rootkit technology that able to conceal itself from antivirus and other security software.
Infostealer.Onlinegame is a Trojan that aims to collect online game credentials like user name and password from an infected computer. The threat will send gathered account to a remote attacker using compromised system’s own email client. It may also download and run additional malware from a remote server.
Boot.Mebroot is a common detection method used to identify Master Boot Record that was infected by Trojan.Mebroot. Boot.Mebroot is a detected MBR or first sector of the hard drive that was contracted by rookit Trojan. This part of the drive is generally used for boot strapping operating system to load it after BIOS has done checking necessary hardware and software requirements. If MBR was infected with Boot.Mebroot , the whole operation can be controlled by the Trojan. More
Trojan.Mebroot is a deadly Trojan that can modify and infect Master Boot Record (MBR) of hard-drive. This Trojan can hide its presence by utilizing a complex rootkit technology. Trojan.Mebroot will infect the Master Boot Record (MBR) of the hard drive where boot-strapping of the operating system occurs. When starting the computer, infected MBR is loaded so as the Trojan that became a part of it. This method makes the harmful Trojan memory-resident. Trojan.Mebroot can now execute its own code that will load specific rootkit-driver and execute other malware that were dropped on the compromised computer. More
Backdoor.Wualess.D is a Trojan that allows remote attacker to obtain unauthorized access on compromised computer. Once inside the system, Backdoor.Wualess.D also creates registry and system service to load itself when Windows is started. It can further harm the affected PC by connecting to a remote server to download and execute more malicious files. More
Trojan.Randsom.C can be dropped by another virus infection or may be acquired by visiting malicious web sites. This Trojan is able to lock desktop of infected computer and asked for a certain fee to unlock it. Trojan.Randsom.C will request payment to be sent electronically. Billing amount may vary depending on victim’s country of origin. More
Downloader.Agent is a detection for family of Trojan that will download and execute additional threat onto the infected computer. It can also disable some Windows process such as Task Manager, Folder Options and Internet Explorer homepage settings. Downloader.Agent will take advantage of certain security and software exploit to sneak into target system. More
Trojan.Virantix.B uses rootkit technology to avoid anti-virus detection. It will modify Internet Explorer home page settings and assign an unwanted URL. Trojan.Virantix.B will attempt to end process that belongs to antivirus application. System tool are also disabled by making changes on Windows registry. Next, it will display fake security alert and prompt user to download a copy of rogue security program. More