Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
[Kaspersky]Datacrime.1514.a;
[Eset]Datacrme.1514.A virus,Datacrme.1280.A virus;
[McAfee]Univ/f;
[F-Prot]DataCrime_II.1514.A;
[Panda]Datacrim.1514,Datacrime.1514,Datacrime.1280;
[Computer Associates]Datacrime II,Datacrime I
Datacrime indications of infection
This symptoms of Datacrime detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
Pigeon.BBG Trojan Cleaner
VBS.Daydream Trojan Cleaner
Bancos.IKV Trojan Removal
Pigeon.AVGJ Trojan Information
Removing Focalink.com Tracking Cookie
No comments:
Post a Comment