You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Win32 is dangerous virus:
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer,
including information related to Internet browser usage or other computer habits
BHO (Browser Helper Object) Trojan.
The BHO waits for the user to post personal information to a monitored website.
As this information is entered by the user, it is captured by the BHO and sent back to the attacker.
The method of network transport used by the attacker makes this Trojan unique.
Typically, keyloggers of this type will send the stolen information back to the attacker via email
or HTTP POST, which can appear suspicious.
Instead, this Trojan encodes the data with a simple XOR algorithm before placing it into
the data section of an ICMP ping packet." explained the company.
Worms can be classified by installation method, launch method and finally according
to characteristics standard to all malware: polymorphism, stealth etc.
Many of the worms which managed to cause significant outbreaks use more then
one propagation method as well as more than one infection technique.
Backdoors combine the functionality of most other types of in one package.
Backdoors have one especially dangerous sub-class: variants that can propagate like worms.
Some RAT trojans are pranks that are most likely being controlled by a friend or enemy on
April Fool's day or a holiday. Prank RATS are generally not harmful, and won't log keystrokes or hack.
These utilities are designed to penetrate remote computers
in order to use them as zombies (by using backdoors) or to download other malicious programs to computer.
Exploits use vulnerabilities in operating systems and applications to achieve the same result.
These programs attack web servers by sending numerous requests to the specified server,
often causing it to crash under an excessive volume of requests.
DoS trojans conduct such attacks from a single computer with the consent of the user.
Worms can carry a DoS procedure as part of their payload.
[Kaspersky]Backdoor.GF.13,Nuker.c2;
[Eset]Win32/Dialer.U trojan;
[McAfee]GirlFriend;
[F-Prot]destructive program;
[Panda]Trj/AF.20,Dialer.Gen,Dialer.UM,Dialer.JL,Dialer.BB,Trojan Horse,Dialer.KI,Bck/GF.13,Trj/W32.Nuker.c2;
[Other]Adware-SafeSurf.dr,W32/Agen.HLE
Win32 Symptoms:
Files:
[%PROFILE%]\start menu\w1inmovieplugin.lnk
[%SYSTEM%]\services\dial.exe
[%WINDOWS%]\system\services\coolers.exe
[%WINDOWS%]\system\services\dale.exe
[%WINDOWS%]\system\services\losvse.exe
[%PROFILE%]\start menu\w1inmovieplugin.lnk
[%SYSTEM%]\services\dial.exe
[%WINDOWS%]\system\services\coolers.exe
[%WINDOWS%]\system\services\dale.exe
[%WINDOWS%]\system\services\losvse.exe
Folders:
[%PROGRAM_FILES%]\dfind.x32
[%PROGRAM_FILES%]\dfind.x64
Registry Keys:
HKEY_CURRENT_USER\software\dfind.x32
HKEY_CURRENT_USER\software\dfind.x64
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\dfind32109
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\dfind64109
You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.
Also Be Aware of the Following Threats:
CWS Adware Cleaner
BEsys Downloader Cleaner
Removing IETray Adware
Nunci Hijacker Symptoms
CWS.DNSRelay Hijacker Removal
No comments:
Post a Comment