Trojans are computer virus that can convey through various methods and usually using Internet connection and compromised files. Most Trojans can be detected by security programs like Anti-virus and Anti-malware. However, there are still some Trojans that can conceal their presence by exploiting vulnerabilities on the operating system.

SNH-gen [Trj]

SNH-gen [Trj] is a multi-component malware. Typically, it has a backdoor function that can perform a number of harmful actions once loaded on victim’s computer. It is developed as a multi-purpose threat that consists of various variants that executes numerous functions.


VirTool:MSIL/SharPersist!rfn is a Trojan that will give remote attacker an access to infected system. This threat also allows an attacker to run arbitrary commands that will add harm on the computer. It is observed that this Trojan may communicate with various servers using shell or http protocol.


TrojanDropper:VBS/Scano!rfn is a Visual Basic Script Trojan that opens a backdoor on compromised computer, which will allow a remote attacker to take full control of it. The Trojan may also monitor system activities and steal sensitive information and other significant data.


Backdoor:Win32/Lancher!rfn is a harmful computer Trojan that attacks a system by exploiting several vulnerabilities in Abode Acrobat and Reader. This Trojan can give unauthorized remote access to the author through a backdoor that was designed specifically for malicious intent.


Backdoor:MSIL/Quasar!rfn is a Trojan that is capable of allowing a remote attacker to access the infected computer and gain control of it. The Trojan may also communicate to a distant server to download another threat or fetch an updates. It also lowers security settings on the compromised system and includes itself on the list of …

Backdoor:MSIL/Quasar!rfn Read More »


TrojanDownloader:JS/Obfuse.XGP!MTB is a Trojan that will modify specifically targeted file extensions. Then, this Trojan will inject a code into legitimate Windows processes in order to conceal itself and evade antivirus program’s detection. It also attempts to contact a remote server and accept extra commands from a remote attacker.


Trojan:Win32/MpTamperSrvDisableDiagTrack.A is a harmful Trojan that can allow a remote attacker to access the computer through backdoor channel. This threat may spread on removable drives as well as risky file-sharing networks, also known as peer-to-peer connection.

Win32:Zorex-A [Wrm]

Win32:Zorex-A [Wrm] is a computer worm that deploys via removable media devices such as USB drives and external hard drives. Once it is present on the PC, it can allow a remote attacker to access the infected system through a backdoor port. Win32:Zorex-A [Wrm] can also further endanger the infected computer when it contact a …

Win32:Zorex-A [Wrm] Read More »


Backdoor:Win32/Bladabindi!ml is Microsoft Defender Antivirus definition for a malware that is a variant of Bladabindi family of Trojan. This particular version can allow a remote attacker to gain control of the infected computer through backdoor. The Trojan frequently communicates to a remote server to download other malware that it can drop and execute on victim’s …

Backdoor:Win32/Bladabindi!ml Read More »


When Microsoft Security Essentials or Windows Defender pop-up a warning regarding the detection of PUA:Win32/PiriformBundler, this means that the computer is infected with a potentially undesirable program (PUP).