Severe threats typically are remotely exploitable vulnerabilities, which can lead to system compromise. Successful exploitation does not normally require any interaction and exploits are in the wild. There exists a high possibility of potential system damage or security flaw. Attacker has complete control over your computer or install new software on your machine.
||Tro.Bagle.SP is a trojan that arrives as an attachment through E-mail.
Tro.Bagle.SP creates the following files in the System32 directory:
Tro.Bagle.SP also creates an "exefld" folder in the WINDOWS directory where more malware/software is downloaded to.
||process: antiav_exe.exe: MD5 Hash: bb0fbc3e7c51c81236f...
process: hloader_exe.exe: MD5 Hash: 275444ac2caac4b90bf...
process: t_535475.exe: MD5 Hash: 275444ac2caac4b90bf..
||Trojan - A Trojan software is any software on a user's computer that the user is not aware or intentionally installed. Most Trojan software is designed to perform some sort of actions that could jeopardize the user's security or privacy.