Home Malware Programs Trojans TR/Agent.73795.2.trojan

TR/Agent.73795.2.trojan

Posted: June 23, 2011

TR/Agent.73795.2.Trojan is a stand-alone Trojan that installs other malicious programs onto your computer. Most TR/Agent.73795.2.Trojan infections are acquired by accepting file transfers from compromised or suspicious sources. Since TR/Agent.73795.2.Trojan can contain many different types of privacy and security-violating PC threats, you should use complete and fully-updated system scans to detect TR/Agent.73795.2.Trojan and related threats for easy removal. By deleting TR/Agent.73795.2.Trojan files manually isn't recommended if other options are open.

Why You Might Be in Danger of a TR/Agent.73795.2.Trojan Attack

TR/Agent.73795.2.Trojan has been reported to be capable of attacking any computer that runs Windows 2000, Windows NT, Windows Vista, Windows XP or Windows 7. An infection by TR/Agent.73795.2.Trojan also bears strong similarities to Win32.Klone.b and Win32.Klone.j threats, which are also Trojans with similar behavior.

In many cases, these Trojans have been found in a packed or compressed form. This lets TR/Agent.73795.2.Trojan and other Trojans avoid being detected and reduces their file sizes to a minimum.

Whether TR/Agent.73795.2.Trojan is compressed or not, TR/Agent.73795.2.Trojan travels in the form of an .exe file. Most TR/Agent.73795.2.Trojan infections are caused by malicious file transfers, some of which may spoof known social contacts to encourage you to accept the file. Try to avoid using .exe files from suspicious sources and always confirm the integrity of a file before using it, and you'll be able to protect yourself from most TR/Agent.73795.2.Trojan attacks.

Click One Little TR/Agent.73795.2.Trojan and Receive Quite a Lot of Problems

In TR/Agent.73795.2.Trojan's basic functions, TR/Agent.73795.2.Trojan is similar to a .zip file or other type of archive. TR/Agent.73795.2.Trojan acts as an overall package that can expand to contain other types of malicious programs. Since the results of a TR/Agent.73795.2.Trojan infection can vary depending on which programs are joined to TR/Agent.73795.2.Trojan, you should consider any TR/Agent.73795.2.Trojan infection to be a severe threat, just to be safe.

Some possibilities include:

  • Spyware that specialize in stealing private information. Trojans like TR/Agent.73795.2.Trojan often install keyloggers that record keyboard input and take screenshots to acquire passwords and account login data.
  • Backdoor Trojans. TR/Agent.73795.2.Trojan may install other Trojans that specialize in attacking your security to let remote criminals exert control over your computer. Common symptoms of a backdoor Trojan attack include unusual network activity, ports opened without your permission and unusual program exceptions added to your firewall.
  • Other Trojans like TR/Agent.73795.2.Trojan prefer to install rogue security programs. Threats will imitate the superficial appearance of genuine software while creating fake errors and blocking security-related programs. Browser hijacks are also common with rogue security program infections.

In most cases, deleting TR/Agent.73795.2.Trojan should be done by an anti-malware or security program. The chance of multiple threats being on a TR/Agent.73795.2.Trojan-infected PC makes deleting TR/Agent.73795.2.Trojan via manual methods a difficult task..

File System Modifications

  • The following files were created in the system:
    # File Name
    1 %Documents and Settings%\[UserName]\Start Menu\ Activate.lnk
    2 %Temp%\wscsvc32.exe
    3 C:\Documents and Settings
    4 C:\Program Files\
    5 C:\Program Files\Common Files

Registry Modifications

  • The following newly produced Registry Values are:
    HKEY..\..\..\..{Subkeys}HKEY_CURRENT_USER\Software\Malware DefenseHKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon 'Shell' = '%UserProfile%\Application Data\antispy.exe'HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion Explorer\ShellFolders Startup="C:\windows\start menu\programs\startupHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments 'SaveZoneInformation' = '1'HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run 'Protection Center'vHKEY..\..\..\..{RegistryKeys}HKEY_CLASSES_ROOT\CLSID\{5E2121EE-0300-11D4-8D3B-444553540000}HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\..{RunKeys}HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce
Loading...