Threat Database Trojans Trojan-PSW.Win32.Agent.oht

Trojan-PSW.Win32.Agent.oht

By SpideyMan in Trojans

Trojan-PSW.Win32.Agent.oht is a very dangerous computer trojan that is going to make a base for future malware infections accessing the affected computer. Trojan-PSW.Win32.Agent.oht was generated to enable remote access to your computer to largely take over precious system resources, track, your Internet habits to record or steal your confidential. Trojan-PSW.Win32.Agent.oht downloads additional components before the attackers get the remote access to the corrupted PC. Trojan-PSW.Win32.Agent.oht has to be removed immediately to keep your computer clean and protected.

File System Details

Trojan-PSW.Win32.Agent.oht may create the following file(s):
# File Name Detections
1. %AppData%\Xenocode\Sandbox\pluginplus\1.00\2010.10.18T18.57\Native\STUBEXE\@SYSTEM@\drwtsn32.exe
2. %AppData%\Xenocode\Sandbox\pluginplus\1.00\2010.10.18T18.57\Native\STUBEXE\@WINDIR@\101.exe
3. %AppData%\Xenocode\Sandbox\pluginplus\1.00\2010.10.18T18.57\Virtual\STUBEXE\@SYSTEM@\Select Password.exe
4. %Windir%\101.exe
5. %System%\104.txt
6. %System%\107.txt
7. %System%\OEAcc.tlb
8. %System%\102.txt
9. %System%\103.txt
10. %System%\IPStore.idl
11. %System%\OEAcc.odl
12. %System%\101.txt
13. %System%\105.txt
14. %System%\108.txt
15. %System%\IPStore.tlb

Registry Details

Trojan-PSW.Win32.Agent.oht may create the following registry entry or registry entries:
HKEY_CURRENT_USER\Software\Xenocode\SandboxCache\9001739C\Virtual\MODIFIED
HKEY_CURRENT_USER\Software\Xenocode\SandboxCache
HKEY_CURRENT_USER\Software\Xenocode\SandboxCache\9001739C\Virtual
HKEY_CURRENT_USER\Software\Xenocode
HKEY_CURRENT_USER\Software\Xenocode\SandboxCache\9001739C\Virtual\MODIFIED\@HKCR@\CLSID
HKEY_CURRENT_USER\Software\Xenocode\SandboxCache\9001739C
HKEY_CURRENT_USER\Software\Xenocode\SandboxCache\9001739C\Virtual\MODIFIED\@HKLM@Read more how to delete Trojan-PSW.Win32.Agent.oht registry entries
HKEY_CURRENT_USER\Software\Xenocode\SandboxCache\9001739C\Virtual\MODIFIED\@HKCR@

Trending

Most Viewed

Loading...