Technical details:
Categories: Trojan
Punisher Folders:
[%PROGRAMS%]\AdwarePunisher
[%PROGRAM_FILES%]\AdwarePunisher
Punisher Files:
[%DESKTOP%]\AdwarePunisher.lnk
[%DESKTOP%]\AdwarePunisher.lnk
Punisher Registry Keys:
HKEY_CURRENT_USER\software\adwarepunisher
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\adwarepunisher
Punisher Registry Values:
HKEY_CURRENT_USER\software\borland\locales
HKEY_CURRENT_USER\software\borland\locales
HKEY_CURRENT_USER\software\borland\locales
HKEY_CURRENT_USER\software\borland\locales
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
Punisher indications of infection
This symptoms of Punisher detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
Removing Lop.com.Active Spyware
AFA Internet Enhancement Adware Removal instruction
Clix0r.exe Trojan Information
Agent.dt Spyware Information
SillyDl.DEQ Downloader Removal instruction
No comments:
Post a Comment