Win32/Dishigy [Threat Name] go to Threat

Win32/Dishigy.AA [Threat Variant Name]

Category trojan
Size 204288 B
Aliases Win32:Malware-gen (Avast)
  Win32/PolyCrypt (AVG)
  TR/ATRAPS.Gen (Avira)
  Trojan.Heur.GZ.m0W@bSJN!gg (BitDefender)
  Worm.Win32.Zwr.c (Kaspersky)
  RDN/GenericBackDoor!uw.trojan (McAfee)
Short description

The trojan serves as a backdoor. It can be controlled remotely.


When executed, the trojan copies itself into the following location:

  • %windows%\­system32\­drivers\­svchost.exe

The trojan registers itself as a system service using the following name:

  • Host Generic Process

This causes the trojan to be executed on every system start.

Other information

The trojan acquires data and commands from a remote computer or the Internet.

The trojan contains a URL address. The HTTP protocol is used.

It can execute the following operations:

  • perform DoS/DDoS attacks

Please enable Javascript to ensure correct displaying of this content and refresh this page.