Technical details:
Categories: Trojan,Backdoor,Downloader,Hacker Tool,DoS
[Kaspersky]Daemaen.2041.b,Daemaen.2048;
[Panda]Daemaen.2048,Talon.2041.MBR;
[Computer Associates]Daemaen.2048,Talon.2041
Daemon Files:
[%WINDOWS%]\System32\bounce.exe
[%WINDOWS%]\System32\bounce.exe
Daemon indications of infection
This symptoms of Daemon detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
Removing Kid.Terror Backdoor
AIM.Robber Trojan Removal instruction
Trident Trojan Information
Pigeon.AVPK Trojan Removal
Bancos.HGE Trojan Removal
No comments:
Post a Comment