Solved

What is a trojan horse dropper generic rgq

Posted on 2007-12-03
1
6,489 Views
Last Modified: 2012-06-27
Using AVG I have just found over 14000 of these in a directory windows\fonts\". They all have names of films, songs, games, programmes etc. and all have a .zip extension.

Can anyone please tell me what they are, how they got there and how to avoid getting them again.

Thanks
0
Comment
Question by:LenAb
1 Comment
 
LVL 7

Accepted Solution

by:
Wod earned 250 total points
ID: 20396847
It is a program that can be used to install other malicious software:
A Trojan Downloader is a program typically installed through an exploit or some other deceptive means and that facilitates the download and installation of other malware and unwanted software onto a victim's PC. A Trojan Downloader may download adware, spyware or other malware from multiple servers or sources on the internet.

How did you get it: probably from P2P networks...

How to avoid them: stop using P2P networks or dont download executable files

0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Malwarebytes software 16 229
Malwarebytes Business Solution 4 80
What makes a cellular data blocked when cable is not 5 64
EE experience on sites similar to VirusTotal? 4 140
You cannot be 100% sure that you can protect your organization against crypto ransomware but you can lower down the risk and impact of the infection.
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question