Threat Database Trojans Troj/Agent-LOT

Troj/Agent-LOT

Troj/Agent-LOT is able to quietly enter a system and further infect it with other malicious programs. Troj/Agent-LOT may gain access to a system via infected e-mail attachments or drive-by downloads. Troj/Agent-LOT may steal private information from a victim's PC and send it to a remote attacker. If you detect Troj/Agent-LOT, do not delay removing it from your computer system.

Aliases

1 security vendors flagged this file as malicious.

Anti-Virus Software Detection
- Win-Trojan/Xema.variant

Registry Details

Troj/Agent-LOT may create the following registry entry or registry entries:
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{4BB1C10E-D349-4C48-A979-1C0E4704A7C5}\1.0]
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{4BB1C10E-D349-4C48-A979-1C0E4704A7C5}\1.0\0\win32]
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F74CB6C6-F83A-439F-AF93-8115376E587C}\ProxyStubClsid32]
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F4355BF2-0E20-4F5D-916F-A4903A883A48}\ProxyStubClsid]
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C1B7E532-3ECB-4E9E-BB3A-2951FFE67C61}]
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C1B7E532-3ECB-4E9E-BB3A-2951FFE67C61}\MiscStatus]
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C1B7E532-3ECB-4E9E-BB3A-2951FFE67C61}\TypeLib]
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C1ACFFD6-514E-49DA-B4FF-30D02FEEED14}]
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\DOWNLOADERACTIVEX.DownloaderActiveXCtrl.1\CLSID]
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{4BB1C10E-D349-4C48-A979-1C0E4704A7C5}\1.0\HELPDIR]
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F74CB6C6-F83A-439F-AF93-8115376E587C}\ProxyStubClsid]
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F4355BF2-0E20-4F5D-916F-A4903A883A48}]
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F4355BF2-0E20-4F5D-916F-A4903A883A48}\TypeLib]
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C1B7E532-3ECB-4E9E-BB3A-2951FFE67C61}\InprocServer32]
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C1B7E532-3ECB-4E9E-BB3A-2951FFE67C61}\ToolboxBitmap32]
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C1B7E532-3ECB-4E9E-BB3A-2951FFE67C61}\MiscStatus\1]
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\DOWNLOADERACTIVEX.DownloaderActiveXCtrl.1]
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{4BB1C10E-D349-4C48-A979-1C0E4704A7C5}\1.0\FLAGS]
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F74CB6C6-F83A-439F-AF93-8115376E587C}]
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F74CB6C6-F83A-439F-AF93-8115376E587C}\TypeLib]
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F4355BF2-0E20-4F5D-916F-A4903A883A48}\ProxyStubClsid32]
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C1B7E532-3ECB-4E9E-BB3A-2951FFE67C61}\Control]
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C1B7E532-3ECB-4E9E-BB3A-2951FFE67C61}\ProgID]
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C1B7E532-3ECB-4E9E-BB3A-2951FFE67C61}\Version]
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C1ACFFD6-514E-49DA-B4FF-30D02FEEED14}\InprocServer32]

Trending

Most Viewed

Loading...