Technical details:
Categories: Spyware
Windows.Activity.Logging.Interface Folders:
[%SYSTEM%]\WALI\SVCS
Windows.Activity.Logging.Interface Files:
[%SYSTEM%]\WALI.dll
[%SYSTEM%]\WALI.dll
Windows.Activity.Logging.Interface Registry Keys:
HKEY_CLASSES_ROOT\clsid\{68acc1a8-cffc-4163-8767-026232db2697}
HKEY_CLASSES_ROOT\interface\{521b4d64-b9d2-4c2f-8460-0eea6fbfd0f5}
HKEY_CLASSES_ROOT\interface\{c1e97cb5-5e3a-456c-b3ee-71db7d986cb1}
HKEY_CLASSES_ROOT\typelib\{06ffef32-4765-4123-8c34-2dfe4fb38976}
HKEY_CLASSES_ROOT\wali.cwalirun
HKEY_CURRENT_USER\software\vb and vba program settings\wali
Windows.Activity.Logging.Interface Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
Windows.Activity.Logging.Interface indications of infection
This symptoms of Windows.Activity.Logging.Interface detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
Removing Pigeon.BBV Trojan
Pigeon.AVSM Trojan Removal instruction
BackWindows RAT Cleaner
Buddah.Cloner DoS Cleaner
Remove User32 Trojan
No comments:
Post a Comment