Trojan

Trojan.Wsnpoem

Trojan.Wsnpoem

Trojan.Wsnpoem is a Trojan horse for Windows operating system. This Trojan may access the Internet and receive commands from a remote server using an HTTP request. More

Trojan.Brisv.A!inf

Trojan.Brisv.A!inf is a detection for a various malicious and infected multimedia files that were endangered with Trojan.Brisv.A. Trojan.Brisv.A!inf tries to search the infected computer for files with the extension of .mp3, .wmv, .wma .mp2 and .mp3 and converts, insert a functionality to download malicious code from a remote server. More

Trojan.Brisv.A

Trojan.Brisv.A is a threat that can be downloaded from file-sharing networks hiding itself on multi-media file. Files infected with Trojan.Brisv.A may trigger Windows Media Player to connect to contracted web sites and download additional virus. Infected file remarkably increased its size by 1,138 bytes after the Trojan append its own code. More

Trojan.Brojack

Trojan.Brojack is a Trojan horse that may hijack search result on the infected computer and redirect the browser to malicious web sites. This Trojan also modifies Internet settings and may install itself as a browser helper object (BHO). Moreover, it may delete any existing toolbar on the computer that it may sense to have conflict with its actions. More

Trojan.Blusod

Trojan.Blusod

Trojan.Blusod is a harmful Trojan made to spread malicious security programs also known as rogue antivirus software. When executed on computer, it will make changes to the system in order to execute security risks and replace the default wallpaper on the PC. This threat will contact a distant server and download additional threats. More

Trojan.Downexec.B!inf

Trojan.Downexec.B!inf is a common detection method used to identify files that were infected with variants of Trojan.Downexec family. This Trojan may attempt to connect to a distant server to download and execute malicious files onto victim’s computer. Moreover, the threat may infect the main file Internet Explorer to load a corrupt code when victim uses the program. More

Downloader.Swif.C

Downloader.Swif.C is a Trojan that can download more threats and execute in the infected computer. It will take advantage of the Adobe Flash Player Multimedia File Remote Buffer Overflow Vulnerability to run the code without user’s intervention. Once the Trojan loads, it may carry out harmful task on the compromised PC. The Trojan can also redirect Internet browser to a web site where malicious SWF file is located. More

Trojan.KillAV

Trojan.KillAV

Trojan.KillAV is a Trojan horse that can reduce security settings on infected computer by ending antivirus programs. The Trojan may also steal sensitive data from the compromised PC. It will also block victim’s access to antivirus company’s web site and avoid download of essential updates for installed security software. This threat not only affects the security. It can also raise the infection to a greater level when it downloads other malware from the Internet. More

W32.Sality.AE

W32.Sality.AE is a Trojan that modifies Windows registry to add an entry so that it can bypass installed firewall programs. Another payload of the virus is to download and execute additional threats from a remote server. W32.Sality.AE will spread on computers by infecting executable files on local and remote drives. It is so harmful that it can delete files that belong to security programs. More

Trojan.Rontokbro

Trojan.Rontokbro is a very harmful Trojan that will disable some Windows resources and performs distributed denial of service (DDoS) attacks on predefined web sites to hamper its operation. The Trojan may also drop other malicious files and create a bunch of registry entries that are essential for its operation. Presence of this Trojan may result to total devastation, it will delete all files and folders it can find on the compromised computer. More