Regger Trojan

Regger virus description
Technical details:
Categories: Trojan
Regger Aliases:
[Panda]Trj/Krepper.F;
[Computer Associates]Win32.Regger.A,Win32/Regger!Trojan

Regger Files:
[%SYSTEM%]\201369.exe
[%SYSTEM%]\explorer32.exe
[%WINDOWS%]\system\107015.exe
[%SYSTEM%]\201369.exe
[%SYSTEM%]\explorer32.exe
[%WINDOWS%]\system\107015.exe

Regger Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Regger indications of infection

This symptoms of Regger detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing SysInf Trojan
Scarab Trojan Removal
TeleAxxor.Server Backdoor Removal instruction
Removing Vxidl.ADE Trojan
Backformat Trojan Symptoms

No comments: