Dark.Avenger Trojan

Dark.Avenger virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Dark.Avenger Aliases:
[Kaspersky]Eddie.Alexander,Eddie.Sign,Eddie.1800.a,Hymn.1865.a,Eddie.2100.b,Eddie.Psko,Eddie.Jericho.a,Eddie,Eddie.Major,Eddie.1693,Eddie.1797,Eddie.Satan.1800,Eddie.Shyster.1802,Eddie.Oliver,Eddie.1028,Eddie.1801,Eddie.2000.a,Eddie.1530,Eddie.1459,Eddie.1687,Eddie.1799.d,Eddie.2100.a,Eddie.Father;
[Eset]Alexandr.1951 virus,Dark_Avenger.Mir virus,probably unknown POLY.TSR.COM.EXE virus,Dark_Avenger.1800.Rabid.B virus,Hymn.1865.A virus,probably unknown TSR.COM.EXE virus,Dark_Avenger.2100.Si.A virus,Dark_Avenger.1803 virus,Dark_Avenger.Jericho virus,Dark_Avenger.1800.A virus,Dark_Avenger.1800.B virus,Dark_Avenger.1800.Boroda virus,Dark_Avenger.1800.C virus,Dark_Avenger.1800.Evil virus,Dark_Avenger.1800.Rabid.A virus,Dark_Avenger.1800.Van virus,Satanvir.2_09 virus,Dark_Avenger.Slowdown virus,Dark_Avenger.1801 virus,Dark_Avenger.2000.Apocal virus,Dark_Avenger.2000.Die_Yng.A virus,Dark_Avenger.2000.Travel.A virus,Dark_Avenger.2000.Travel.C virus,Dark_Avenger.1530 virus;
[McAfee]Univ/j,Univ/f,Dark Avenger,Dark Avenger.dr,Dark Avenger.1028,Dark Avenger.2000;
[F-Prot]Dark_Avenger.1800.AA,Dark_Avenger.1800.B,Dark_Avenger.1800.P,Dark_Avenger.1800.W,Dark_Avenger.1800.X,corrupted or intended virus,Dark_Avenger.1801.A,Dark_Avenger.2000.A,Dark_Avenger.2000.C,Dark_Avenger.2000.I;
[Panda]Eddie.Alexander,MIR.1745,Dark Avenger.1800,Hymn,Dark Avenger.2100,Univ,Jericho,Univ.EQ,Eddie.1693,Eddie.Satan.1800,Oliver,V1028,Dark Avenger.1801,Dark Avenger.2000,CB.1530,Dark Avenger.1777,Dark Avenger Father;
[Computer Associates]Dark Avenger,Dark_Avenger.1800.A,Hymn,Dark Avenger 2100,Dark_Avenger.2100,PS-MPC,Outland,Slowdown,Dark Avenger 2000,Father

Dark.Avenger indications of infection

This symptoms of Dark.Avenger detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
My.PanicButton Trojan Symptoms
Remove Safety Bar Trojan
Hooker Trojan Removal instruction
QatarIT.QTK Spyware Cleaner
My.Search Toolbar Information

No comments: