Technical details:
Categories: Trojan,Backdoor,Hacker Tool
[Kaspersky]TrojanDropper.Win32.Decept.10,TrojanDropper.Win32.Decept.20.a,TrojanDropper.Win32.Decept.20.b,TrojanDropper.Win32.Decept.30.a;
[Panda]Trojan Horse,Trojan Horse.LC,Trj/W32.Decept;
[Computer Associates]Backdoor/Deception.10,Win32.Deception.10,Backdoor/Deception.20.B,Win32.Deception.20.B,Backdoor/Deception.20,Win32.Deception.20,Win32/Decept.10!Dropper,Backdoor/Deception.30.A,Win32.Deception.30,Backdoor/Deception.21.B,Win32.Deception.21.B,Backdoor/Deception.21,Win32.Deception.21
Deception indications of infection
This symptoms of Deception detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
NetKillx Backdoor Removal instruction
Pigeon.ARI Trojan Cleaner
Bancos.GCI Trojan Removal instruction
Zhongsou Adware Removal instruction
Lemir.ci Trojan Symptoms
No comments:
Post a Comment