Technical details:
Categories: Trojan,Backdoor,Virus
[Panda]Bck/ABM.A;
[Computer Associates]Backdoor/Wollf.14
Wollf Files:
[%SYSTEM%]\STSS.exe
[%SYSTEM%]\wrm.exe
[%SYSTEM%]\STSS.exe
[%SYSTEM%]\wrm.exe
Wollf Registry Keys:
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_sslts
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_wrm
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sslts
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\wrm
Wollf indications of infection
This symptoms of Wollf detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
PolygoneZeichen Trojan Symptoms
W16.WinVir.dr Trojan Removal instruction
Enculator Backdoor Symptoms
Apdoor.cr Backdoor Removal
Remove Win32.NetDown Trojan
No comments:
Post a Comment