Trojan.Injector.PG
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Threat Level: | 80 % (High) |
| Infected Computers: | 1 |
| First Seen: | February 15, 2023 |
| Last Seen: | November 1, 2023 |
| OS(es) Affected: | Windows |
The Trojan.Injector.PG is a typical Trojan that utilizes code injection to hide its activities and hinder automated cyber security mechanisms. The threat presented by Trojan.Injector.PG can be compared to other code injectors like Trojan.Comet.A, Win-Trojan/Injector.6144.C and Trojan.Injector.BZ. The Injector.PG Trojan may be deployed via malvertising and spam campaigns and connect to a remote server to download instructions sent by its operators. The Trojan.Injector.PG cyber threat is known to inject its core process into a separate thread under a Windows process named ctfmon.exe that handles the Alternative User Input and Office Language Bar. The Trojan.Injector.PG malware may record the user's input via pen tablet, keyboard, voice and onscreen keyboard for Asian languages. Trojan.Injector.PG works as a keylogger that has extended capabilities and may make screenshots of your desktop.
The Trojan.Injector.PG malware may create HTML, TXT and INI files to log the activities of infected users and sent the collected data as an HTTP request to its 'Command and Control' servers. The Trojan.Injector.PG malware does not encrypt its connections, and network administrators may notice its traffic. The majority of samples of Trojan.Injector.PG collected by malware researchers suggest that it may not slow down your computer, but it may crash your browser and prevent pages from displaying properly. The Injector.PG Trojan may place its files in the Temp folder of Windows to evade security scans. The Trojan.Injector.PG malware may write a registry entry in Windows to run every time you log on. Computer users can protect their Windows OS and credentials by installing a credible anti-malware suite.