Home > Trojan Horse > Trojan Horse PSW.Sclog.B

Trojan Horse PSW.Sclog.B

TROJ_AGENT.AO ...Downloader-TN (McAfee), SecurityRisk.Downldr (Symantec), TR/Dldr.Centim.Gen.2 (Avira), Troj/Dowcen-Gen (Sophos),Description:TROJ_AGENT.AO is a Trojan horse program, a malware that has no capability to spread into other systems... TROJ_AGENT.AO ...Downloader-TN (McAfee), SecurityRisk.Downldr (Symantec), TR/Dldr.Centim.Gen.2 (Avira), Troj/Dowcen-Gen (Sophos),Description:TROJ_AGENT.AO is a Trojan horse program, a malware that has no capability to spread into other systems... TROJ_SC.A ...McAfee), Trojan Horse (Symantec), TR/Dldr.Delphi.Gen (Avira), Troj/Dloader-DY (Sophos), TrojanDownloader:Win32/Tearspear (Microsoft)Description:TROJ_SC.A is a Trojan horse program, a malware that has no capability to... They are spread manually, often under the premise that the executable is something beneficial. check over here

After its download routine, it will then terminate the executed process. TROJ_SMALL.TT ...Kaspersky), Downloader-RD (McAfee), Downloader (Symantec), TR/Dldr.Small.TT (Avira), Troj/Small-TT (Sophos),Description:TROJ_SMALL.TT is a Trojan horse program, a malware that has no capability to spread into other systems... The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Back to Top View Virus Characteristics Virus Information Virus Removal Tools Threat Activity Top Tracked Viruses Virus Hoaxes Regional Virus Information Global Virus Map Virus Calendar Glossary

TROJ_ZAYAN.A Alias:Zayan (McAfee), Trojan Horse (Symantec), TR/Zayan.A (Avira), Troj/Zayan-A (Sophos),Description:TROJ_ZAYAN.A is a Trojan horse program, a malware that has no capability to spread into other systems... Infecting other connected devices on the network. TROJ_ROOTKIT.B ...NTRootKit-G (McAfee), Hacktool.Rootkit (Symantec), TR/Rootkit.B.1 (Avira), Troj/NTRootK-Q (Sophos),Description:TROJ_ROOTKIT.B is a Trojan horse program, a malware that has no capability to spread into other systems... E; A.

TROJ_AGEND.DB ...Downloader-PH (McAfee), Trojan Horse (Symantec), TR/Dldr.Agent.DB.1 (Avira), Troj/NewIfrm-A (Sophos),Description:TROJ_AGEND.DB is a Trojan horse program, a malware that has no capability to spread into other systems... Retrieved 2014-01-26. ^ BitDefender.com Malware and Spam Survey ^ Datta, Ganesh. "What are Trojans?". mobile) Standard Edition (Hosted by You, protects all devices, except mobile) Advanced Edition (Hosted by You, protects all devices, inc. It is usually installed by another malware and may be used as a component in performing malicious...

Trojan horse (computing) From Wikipedia, the free encyclopedia Jump to: navigation, search For other uses, see Trojan horse (disambiguation). Data corruption. It opens a random system port, where it listens for commands from... Unlike viruses, Trojans do not self-replicate.

Product support Internet safetyfor kids and families The 6 big dangers Be-smart school programmes Internet safety library What's Your Story contest All topics For Business >Small Business2-100 users Popular products: TROJ_DROPPER.MR ...Trojan Horse (Symantec), DR/PSW.Zapchast.469 (Avira), Troj/Zapchas-H (Sophos),Description:This Trojan drops numerous...Micro as the following: HKTL_HIDEWIN.G. e.g. %WINDIR% = \WINDOWS (Windows 9x/ME/XP/Vista/7), \WINNT (Windows NT/2000) %PROGRAMFILES% = \Program Files The following files were analyzed: 94DD164CD04EE392A10078FF6AA128E0F35D6D49 The following files have been added to the system: %WINDIR%\SYSTEM32\sysfrcx.dll%WINDIR%\SYSTEM32\sysfrcx.exe The following Unlike viruses, Trojans do not self-replicate.

Registered in Ireland No. 364963. TROJ_DLOADER.CG ...W32/Downldr2.CFHG (exact) (F-Prot), Mal/DowAdv-B (Sophos),Description:This Trojan is dropped on a system by TROJ_LEMIR.DQ. TROJ_SAGIC.141 ...PWS-Sagic.cfg (McAfee), Trojan.ConstructKit (Symantec), TR/Sagic.5 (Avira), Troj/PWSSagi-A (Sophos),Description:TROJ_SAGIC.141 is a Trojan horse program, a malware that has no capability to spread into other systems... Although their payload can be anything, many modern forms act as a backdoor, contacting a controller which can then have unauthorized access to the affected computer.[6] This infection allows an attacker

Upload a file Leave a comment Please enable JavaScript to add new comment comments powered by Disqus. http://songstersoftware.com/trojan-horse/trojan-horse-generic-11-av-trojan-horse-dropper-generic-aamd.html Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc. TROJ_ANOMALY.FM ...URLs to download malicious files. All rights reserved.

Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.

All Users: Please use the following instructions for all supported versions of Windows to remove threats and other potential risks: Comment with other users about issues. Virus Removal Tools Many virus problems are prevented using AVG Internet Security, our best and most complete virus and privacy protection. this content TROJ_VUNDO.APF ...unknowingly by a user when visiting malicious Web sites.

Buy Home Office Online Store Renew Online Business Find a Partner Contact Us 1-877-218-7353 (M-F 8am - 5pm CST) Small Business Small Business Online Store Renew Online Find a Partner Contact TROJ_DLOADER.RTP Alias:TR/Keylogger.adh.20 (Avira), TrojanDownloader:Win32/Agent (Microsoft) TROJ_KEYLOG.DX Alias:Generic Keylogger.i (McAfee), Trojan Horse (Symantec), TR/PSW.Steal.94208.1 (Avira), Mal/Generic-A (Sophos), TROJ_SCKEYLOG.AS Alias:Trojan-Spy.Win32.SCKeyLog.i (Kaspersky), Spyware.Keylogger (Symantec), TR/SCKeylog.20.D (Avira), TROJ_SCKEYLOG.AZ Alias:Trojan-Spy.Win32.SCKeyLog.ap (Kaspersky), Generic Keylogger.k (McAfee), Spyware.SCKeyLogger (Symantec), TROJ_NUKEDFMA.B ...Nuke-DFM (McAfee), ICQ.Flooder (Symantec), TR/Flood.ICQ.DFMA.B (Avira), Troj/Flooder-BG (Sophos),Description:TROJ_NUKEDFMA.B is a Trojan horse program, a malware that has no capability to spread into other...

TROJ_KILLAV.AE ...Kaspersky), ProcKill-BZ (McAfee), Avkiller.Trojan (Symantec), DR/KillAV.CN.1 (Avira), Troj/Killav-L (Sophos),Description:TROJ_KILLAV.AE is a Trojan horse program, a malware that has no capability to spread into other systems...

Most Trojan horses can be detected and removed by AVG. TROJ_AOLPS.FT ...APStrojan.gen6 (McAfee), Bloodhound.AOLPWS (Symantec), TR/Aol.Explore (Avira), Troj/Poison-2 (Sophos),Description:TROJ_AOLPS.FT is a Trojan horse program, a malware that has no capability to spread into other systems... Upload it and check it! Govware is typically a trojan horse software used to intercept communications from the target computer.

TROJ_QQPASS.BL ...Generic.f (McAfee), Trojan.PWS.QQPass (Symantec), TR/PSW.QQpass.BL (Avira), Troj/QQPass-HL (Sophos),Description:TROJ_QQPASS.BL is a Trojan horse program, a malware that has no capability to spread into other systems... 312638 Total Search | Watch the safety status of any website. S Choi (1993). have a peek at these guys Where to buy Downloads Partners About us Worldwide Login Purchase Trend Micro products Please select: Products for home users and home office Products for small and medium businesses Products for

Please go to the Microsoft Recovery Console and restore a clean MBR. All rights reserved. It saves the downloaded files. After its download routine, it will then terminate the executed process.

It may arrive as a .DLL file that exports functions used by TROJ_VUNDO or TROJ_VIRTUMUNDO variants.