Monday, December 1, 2008

Doly Trojan

How To Remove Doly?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Doly is dangerous virus:
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Spyware can even change computer settings, resulting in slow connection speeds,
different home pages, and loss of Internet or other programs.
In an attempt to increase the understanding of spyware, a more formal classification
of its included software types is captured under the term privacy-invasive software.
Backdoors are used by virus writers to detect and download confidential information,
execute malicious code, destroy data, include the machine in bot networks and so forth.

Many trojans and backdoors now have remote administration capabilities
allowing an individual to control the victim's computer.
Many times a file called the server must be opened on the victim's computer before
the trojan can have access to it.

These are generally sent through email, P2P file sharing software,
and in internet downloads. They are usually disguised as a legitimate program or file.
Many server files will display a fake error message when opened, to make it seem like it didn't open.
Some will also kill antivirus and firewall software.

Some RAT trojans are pranks that are most likely being controlled by a friend or enemy on
April Fool's day or a holiday. Prank RATS are generally not harmful, and won't log keystrokes or hack.
They usually do whimsical things like flip the screen upside-down, open the CD-ROM tray,
and swap mouse buttons. However, they can be quite hard to remove.
Hacker Tools are designed to penetrate remote computers
in order to use them as zombies or to download other malicious programs to computer.


Doly It also known as:

[Kaspersky]Backdoor.Doly.15,Backdoor.Doly.20,Backdoor.Doly,Backdoor.Doly.11,Backdoor.Doly.12,Backdoor.Doly.135,Backdoor.Doly.16;
[McAfee]Generic,BackDoor-AZ;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/Doly.1.5,Bck/Doly.20,Backdoor Program,Backdoor Program.LC,Bck/Doly.1.1,Bck/Doly.1.2;
[Computer Associates]Backdoor/Doly.15,Backdoor/Doly.20,Win32.Doly.20,Backdoor/Doly,Backdoor/Doly.1_2!Server

Doly Symptoms:

Files:
[%PROGRAMS%]\doly trojan 1.5\dolyt15.exe.lnk
[%PROGRAMS%]\doly trojan 1.5\remove doly trojan v1.35.lnk
[%PROGRAMS%]\doly trojan 1.6\doly trojan 1.6.lnk
[%PROGRAMS%]\doly trojan 1.6\read-me.lnk
[%PROGRAMS%]\doly trojan 1.5\dolyt15.exe.lnk
[%PROGRAMS%]\doly trojan 1.5\remove doly trojan v1.35.lnk
[%PROGRAMS%]\doly trojan 1.6\doly trojan 1.6.lnk
[%PROGRAMS%]\doly trojan 1.6\read-me.lnk

Folders:
[%PROFILE%]\start menu\programs\doly trojan 1.5
[%PROFILE%]\start menu\programs\doly trojan 1.6
[%PROGRAM_FILES%]\doly trojan1.6
[%PROGRAM_FILES%]\doly15

Registry Keys:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\doly
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\doly trojan 1.6

Registry Values:
HKEY_LOCAL_MACHINE\software\-a-=d=-m-\doly trojan\1.6
HKEY_LOCAL_MACHINE\software\tg byte software\setup\currentversion\uninstall specialist


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Pigeon.EJE Trojan Information
agentinteractive.com Tracking Cookie Cleaner
Sysrater Trojan Information
Spot.Bot Trojan Removal
Storark Trojan Symptoms

No comments: