Selected viruses, spyware, and other threats: sorted alphabetically
Short descriptionThe trojan serves as a backdoor. It can be controlled remotely.
InstallationThe trojan does not create any copies of itself.
Other informationThe trojan acquires data and commands from a remote computer or the Internet.
The trojan connects to the following addresses:
It can execute the following operations:
- download files from a remote computer and/or the Internet
- send files to a remote computer
- run executable files
"svchost" = "%malwarepath%"
The trojan may create the following files: