Trojan.Gen.3
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 90 % (High) |
Infected Computers: | 130,850 |
First Seen: | August 23, 2013 |
Last Seen: | March 1, 2023 |
OS(es) Affected: | Windows |
Trojan.Gen.3 is a generic detection for various types of Trojan infections. These typically affect computer systems running the Windows operating system and have been around for more than a decade. Typically, a security program will detect a Trojan.Gen.3 infection when it detects the presence of a Trojan that does not have a specific malware definition. This means that the Trojan present in the victim's computer contains various characteristics that have triggered the security program's security measures due to the fact that they are commonly present in known Trojan infections. The presence of a Trojan.Gen.3 infection usually indicates that it is necessary to run a strong anti-malware program to disinfect your computer.
Table of Contents
The Bad Payload of Trojan.Gen.3 and Other Trojan Infections
Trojan.Gen.3 and other Trojans are named after the Trojan horse from the Greek literature. This is because they are often disguised as beneficial or tempting files that actually hide a harmful payload inside. Trojan.Gen.3 will often be disguised as an application or file that has a component that lures a computer user into opening it. The main difference between a Trojan infection and a virus is that Trojans like Trojan.Gen.3 do not spread on their own or replicate themselves, usually requiring the use of social engineering or other malware to spread from one computer to another. In many cases, a Trojan.Gen.3 will run a fake version of a legitimate program in order to distract the computer user while Trojan.Gen.3 runs malicious code in the background. For example, many Trojan.Gen.3 infections are disguised as PDF files containing a fake invoice, resume or news item. When the computer user opens the malicious PDF file, an actual document containing that particular content will be opened, but Trojan.Gen.3 will run its malicious code in the background. Most Trojan.Gen.3 infections rely on deception and trickery to spread, many approaches that are commonly referred to as social engineering. They may also be installed by attack websites or by other types of malware; for example, those known as Trojan droppers or downloaders.
Trojan.Gen.3 infections are commonly used to steal money from computer users. Monetizing these infections can be done in various ways. For example, some Trojan.Gen.3 infections try to mine bitcoins using the victim's computer's resources. Other Trojan.Gen.3 infections are used to steal financial information or to affect the infected computer's Web browser to force computer users to view online advertisements, click on affiliate marketing links or fill out online surveys.
SpyHunter Detects & Remove Trojan.Gen.3
File System Details
# | File Name | MD5 |
Detections
Detections: The number of confirmed and suspected cases of a particular threat detected on
infected computers as reported by SpyHunter.
|
---|---|---|---|
1. | global_installer.exe | a7b6797f02e2cff1fdc890087081cb41 | 162 |
2. | troj_pws_70c2b4e9b05d2df4f02204b6c6831c4d0deb7145ed656523af43e8a5500695da.exe | 947000cb3617581fdf9093f1504243a4 | 160 |
3. | update.exe | ec7d5d13bc1b0c13e68cbae423082128 | 159 |
4. | troj_generic_e0ec8c3fd923077993d09c57f9626e4f606cfc762747cb46e68626ec9311aac0.exe | ca44e8e1b48a056ab9783fc06895495e | 158 |
5. | troj_generic_e5bf65e967f4192054f735de13c66402252c11fdc3bc1d4d7691c10c7bc68878.exe | 63641f97c2151c8dfed9e4c681488338 | 158 |
6. | troj_generic_f8c23cde9eb237539160643fa7977220138d2bd0f723d24982414aa7fab4098a.exe | 01b7f8c9f56ae4308c921a4d5424e9be | 158 |
7. | sp2.exe | 478037c26b9544241f167744b58cb18e | 135 |
8. | troj_generic_ff3949cc68475131251329228d2bb130709c7eea92470559fb67a5a49a93a40a.exe | b72bcaddf5c23778cb6481e3788e4b4f | 132 |
9. | troj_generic_ebaaaa8c44e8e6134f90cc328043d2106aeba1e5ca656810c4e107af7017bde2.exe | be5cebd90b66ddb0f500e8f46c486d1e | 131 |
10. | troj_generic_ebab8001e963f16b54ce0ce5bad1fd4e06a4dbfa2fc11806871b1b22ebb41fe1.exe | 0b37dacc7c054e93cf37a5fc7143c89c | 131 |
11. | troj_generic_f1784633f7579d38557e30c157e5fe3dbb82ccb0196f16553e890ce47913afc1.exe | a6540757f56029d8b055c8f257c2abd5 | 131 |
12. | troj_generic_f277e727dad35df0d73a987fbafe8934cc1b53dc0243cebb6751ee11134098a5.exe | 3d453432cc687948a6c40b8f3d43d49d | 131 |
13. | troj_pws_e9e2ddb857eb8afdf9150f3db64f117d7c0c49bd648239b7e4ea2629f61f0304.exe | 79397210b948089baa44cab73ef8556b | 131 |
14. | worm_ef7be898379b107ffcb80465fa95ca20dbec869d2553c91d73faaf88673ba3f9.exe | 6bb89436ea164f2a02d257c4f7b33665 | 131 |
15. | troj_generic_f4ad23b97d7391316280397f8e2683ef263c9eb6c01c12ce48845d44df10e1ec.exe | 4b86b158ab5fd1f69441f27ce7d5fb11 | 130 |
16. | troj_generic_ff4bc3fef69b56c909c55da7291974ac1b1261f88db2a51011272c48cb81c5d6.exe | f31124105a9ba9fd93ec30bbd5314350 | 130 |
17. | virus_c2e1bc66a2e75c19d4ca9f9f5ed6ead3bba130cbc217be47821079ab497e2bb1.exe | 1180d7936699432e76c15b2891b195dd | 130 |
18. | worm_b4420bc4871fbb30bce44718099783eeaa9f9334e3d32f1b5013e9a83b5927f3.exe | 8ebfd510e407af3488fde2068f73c989 | 130 |
19. | troj_generic_e540abe1e80f970bb92ae369f0960cd3fe8cedc815a91bf174c9cad55eafbd1c.exe | 0079c348f4be75fd19e3d9abaae19716 | 1 |
20. | troj_generic_e6e712cee3617d1e0a7ca3ee3c2be83db6ee5c518400512bb3ff2a8da1d7a60b.exe | 1d03a6450fb4e4fc7449f3ba985424ef | 1 |
21. | troj_generic_ea870b70f5e02a0a431751be76c168f2e95c99e22a0591837eb9ef88c87845c7.exe | ed01333d94080fbd5608cad297b32fbf | 1 |
22. | troj_generic_eac5ae395cf36d24c100a8c77d1838fb24f2a501a8c088a760cdeb8a090d0bb1.exe | d06effd9b39a1772d53b6099ad36c480 | 1 |
23. | troj_generic_ee7d2edcd2e8a358e17b542dc7c940cf52ee3f4c56a28c82c03171c6adfc51f2.exe | 566b3c92f88154d9c09f926d578d4e71 | 1 |
24. | troj_generic_f2acc57cc4821b0e704b21e6219b9f7649c856289348ce393a61a64ebea4d9b1.exe | 57f789ae916da96789da94b3a01e8523 | 1 |
25. | troj_generic_f4d16fee12a2e53a0c439092189c2e1ef44e62f7c2bb601b3b8608a7589cb456.exe | 8ed144d6adc88c4f5281ece8c6887f59 | 1 |
26. | troj_generic_fcd98bc6618833ce82aeb8f8ddcbef81c11b9c1fb61a342d95bd5fad176d1e24.exe | fd0692fcffa1c5b6b2b3a94cff005f6a | 1 |
27. | troj_generic_fd3bd3cd7a2c8ff5525e23cb93cb9a5ed5eeaa5a03b81f27a775905d62dab0b5.exe | 9bdcee71b5ccf073b6293fa59195781b | 1 |
28. | troj_generic_ffcd7065d44cea65d80954f7a02c706501db2c7913820e9d1645c9b28d5ec67f.exe | 2cbc906465811b4f084cef84b4cab2d8 | 1 |
29. | troj_pws_10d7997c8a4413157c11c402cc6ce238d1fd64d8a51a5a0bf5fc4aee2239790a.exe | e5ab4cfc92072998ed7fddaabf7fe4d3 | 1 |
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.