You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
PerfectKeyLogger is dangerous virus:
Spyware is computer software that is installed surreptitiously on a personal computer
to intercept or take partial control over the user's interaction
with the computer, without the user's informed consent.
While the term spyware suggests software that secretly monitors the user's behavior,
the functions of spyware extend well beyond simple monitoring.
Spyware programs can collect various types of personal information,
such as Internet surfing habit, sites that have been visited,
but can also interfere with user control of the computer in other ways,
such as installing additional software, redirecting Web browser activity,
accessing websites blindly that will cause more harmful viruses,
or diverting advertising revenue to a third party.
Spyware can even change computer settings, resulting in slow connection speeds,
different home pages, and loss of Internet or other programs.
In an attempt to increase the understanding of spyware, a more formal classification
of its included software types is captured under the term privacy-invasive software.
BHO (Browser Helper Object) Trojan.
The BHO waits for the user to post personal information to a monitored website.
As this information is entered by the user, it is captured by the BHO and sent back to the attacker.
The method of network transport used by the attacker makes this Trojan unique.
Typically, keyloggers of this type will send the stolen information back to the attacker via email
or HTTP POST, which can appear suspicious.
Instead, this Trojan encodes the data with a simple XOR algorithm before placing it into
the data section of an ICMP ping packet." explained the company.
[Computer Associates]Win32/PerfectKeyLogger.141!Troja
PerfectKeyLogger Symptoms:
Files:
[%PROGRAM_FILES%]\Invisible Keylogger\downloads.url
[%PROGRAM_FILES%]\Invisible Keylogger\help.url
[%PROGRAM_FILES%]\Invisible Keylogger\license.txt
[%PROGRAM_FILES%]\Invisible Keylogger\order.url
[%DESKTOP%]\shortcut to datview.lnk
[%PROFILE_TEMP%]\iks.txt
[%PROGRAM_FILES%]\Invisible Keylogger\downloads.url
[%PROGRAM_FILES%]\Invisible Keylogger\help.url
[%PROGRAM_FILES%]\Invisible Keylogger\license.txt
[%PROGRAM_FILES%]\Invisible Keylogger\order.url
[%DESKTOP%]\shortcut to datview.lnk
[%PROFILE_TEMP%]\iks.txt
Folders:
[%PROGRAM_FILES%]\invisible keylogger
[%PROGRAMS%]\spypatrol invisible keylogger
[%PROGRAM_FILES%]\perfect keylogger 1.6
Registry Keys:
HKEY_CLASSES_ROOT\bpk.iespy
HKEY_CLASSES_ROOT\bpk.iespy.1
HKEY_CLASSES_ROOT\clsid\{1e1b2879-88ff-11d3-8d96-d7acac95951f}
HKEY_CLASSES_ROOT\interface\{1e1b2878-88ff-11d3-8d96-d7acac95951f}
HKEY_CLASSES_ROOT\typelib\{1e1b286c-88ff-11d3-8d96-d7acac95951f}
HKEY_LOCAL_MACHINE\software\classes\interface\{1e1b2878-88ff-11d3-8d96-d7acac95951f}
HKEY_LOCAL_MACHINE\software\classes\typelib\{1e1b286c-88ff-11d3-8d96-d7acac95951f}
HKEY_CURRENT_USER\software\spypatrol internet surveillance\invisible keylogger
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{1e1b2879-88ff-11d3-8d96-d7acac95951f}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\invisible keylogger 1.1
HKEY_LOCAL_MACHINE\software\spypatrol internet surveillance\invisible keylogger
Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer
You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.
Also Be Aware of the Following Threats:
No comments:
Post a Comment