Door Trojan

Door virus description
Technical details:
Categories: Trojan,Backdoor,Hacker Tool
Door Aliases:
[Kaspersky]Backdoor.IcmpRep,Backdoor.InjShell.a,HackTool.Win32.SetDll,Backdoor.G_Door.d;
[Eset]Win32/G_Door.C trojan,Win32/G_Door.C.Server trojan,Win32/G_Door.D.Client trojan;
[Panda]Backdoor Program,Bck/IcmpRep.A,Bck/InjShell.A,HackTool/NetCat.A;
[Computer Associates]Backdoor/IcmpRep!Server,Backdoor/InjShell.a,Backdoor/NC99,Win32.NC99,Backdoor/G_Door

Door indications of infection

This symptoms of Door detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AXV Trojan Removal instruction
Win32.Mooder Trojan Cleaner
ZKeylog Spyware Removal instruction
ValueAd Tracking Cookie Removal
IEAgentDown Downloader Information

No comments: