Trojan.Poison Description

Trojan.Poison is a horrible Trojan that can cause numerous PC problems. Once downloaded, Trojan.Poison seems to act innocently, however, it fools security programs while combining with damaging software immediately after installing onto the affected PC user's computer. Trojan.Poison is so sophisticated in that its malicious activity doesn't become apparent when its code is directly investigated by security researchers or security software. Trojan.Poison usually functions like a common Trojan downloader. Trojan.Poison can change or add system processes and modify registry entries. Trojan.Poison also changes its task actively via taking down and running x86 commands straight into its own analysis that then makes its devastation. Trojan.Poison may decrease PC and browsing performance and display numerous annoying pop-ups. Remove Trojan.Poison by using an effective malware removal tool.

Aliases: Backdoor.Win32.PoisonIvy.8692, BKDR_POISON.DS [TrendMicro], Backdoor.Trojan [Symantec], Troj/Poison-AE [Sophos], Trojan.Win32.Undef.sjx, High Risk Worm [Prevx1], Trojan.DL.CKSPost.Gen, Trojan-Downloader/W32.Agent.9788, PoisonIvy.gen19, a variant of Win32/Poison [NOD32], Backdoor:Win32/Poisonivy.H [Microsoft], Trojan.Backdoor.Poison.CPD [McAfee-GW-Edition], BackDoor-DKI.gen.d [McAfee], [Kaspersky] and Trojan.Win32.Inject [K7AntiVirus].

Technical Information

File System Details

Trojan.Poison creates the following file(s):
# File Name Size MD5
1 CLADD 8,192 bed8b95ace8e29bea18c0178f33211f6
2 lsass.exe 40,960 6ff75b1f5feef8bcb08ff1290220b17b

Registry Details

Trojan.Poison creates the following registry entry or registry entries:

Site Disclaimer is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.

Leave a Reply

Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.

HTML is not allowed.