Home Malware Programs Trojans Bypass trojan

Bypass trojan

Posted: March 28, 2006

It is clear from the name of this trojan, that it uses its specific stealth algorithms to bypass the defense of the target PC. This spyware usually performs a set of many destructive actions, which can lead to the computer instability. This trojan is also able to mine data and send the results to the specific location on the Internet.

File System Modifications

  • The following files were created in the system:
    # File Name
    1 984bf15f372dd9c35bbd95accc9d2ff5.exe
    2 bypass.asm

Related Posts

Loading...