Trojan

Trojans are computer virus that can convey through various methods and usually using Internet connection and compromised files. Most Trojans can be detected by security programs like Anti-virus and Anti-malware. However, there are still some Trojans that can conceal their presence by exploiting vulnerabilities on the operating system.

Ransom:MSIL/Filecoder

Ransom:MSIL/Filecoder is a detection for a highly dangerous computer virus that is capable of locking the files on the infected computer. It can arrive on the device as an attached file to spam email messages.

Ransom:MSIL/Cry

Ransom:MSIL/Cry is an anti-virus software signature that was developed to detect a type of computer virus with ransomware capabilities. As a creation of hackers, this virus is able to penetrate the system secretly and opens a way for the attackers to dominate the computer.

TrojanSpy:MSIL/AgentTesla

TrojanSpy:MSIL/AgentTesla is a detection by Microsoft Defender Antivirus for a computer threat that can drop a copy of additional malware on the device. Computer users vital information are also in danger once the system is infected with this virus.

Ransom:Win32/Zudochka

Ransom:Win32/Zudochka is a computer virus that aims at making vital user’s files inaccessible. This threat has the very basic attribute of a crypto-virus or file-coder and the objective is to extort money from victims by holding their important files as hostages.

Win32:DropperX-gen [Drp]

Win32:DropperX-gen [Drp] is a computer virus that was designed to dump a separate malware on the infected system that it obtains from a remote server.

PWS:Win32/Ymacco.AA5C

PWS:Win32/Ymacco.AA5C is a hazardous virus that can steal sensitive information from the computer. This detection by Microsoft Defender Antivirus aims on tagging malicious software that was tasked to scout the computer for vital information and harvest it as commanded by the attackers.

Behavior:Win32/OkSearchRedir.A

Behavior:Win32/OkSearchRedir.A is a detection for a computer malware that is able to penetrate the computer via malicious software installer. This detection was designed to capture malicious software that attackers are using to control the internet browser application and alter the settings without the consent of user.

Win32:Dh-A [Heur]

Win32:Dh-A [Heur] is a heuristic detection for a hazardous computer virus that can perform a number of malicious actions on the computer depending on the preference of attackers.

Trojan:Win32/Vagger!rfn

Trojan:Win32/Vagger!rfn is a detection for a computer virus that infects the system to perform ransomware acts. It can enter the computer if user frequently visits a malicious website or download any executable file from the mentioned location.

Ransom:Win32/Pecrypt

Ransom:Win32/Pecrypt is a detection by Microsoft Defender Antivirus for a malware that can do a couple of hazards on the computer. One is known as file-coder ability in which the virus is able to render the affected files unusable.