Technical details:
Categories: Spyware
Computer.Use.Reporter Files:
[%COMMON_DESKTOPDIRECTORY%]\Computer Use Reporter.lnk
[%COMMON_PROGRAMS%]\Computer Use Reporter.lnk
[%COMMON_STARTMENU%]\Computer Use Reporter.lnk
[%COMMON_STARTUP%]\cure.exe
[%PROGRAM_FILES%]\CUR\CUR.txt
[%PROGRAM_FILES%]\CUR\CURC.exe
[%PROGRAM_FILES%]\CUR\Pointer.html
[%COMMON_DESKTOPDIRECTORY%]\Computer Use Reporter.lnk
[%COMMON_PROGRAMS%]\Computer Use Reporter.lnk
[%COMMON_STARTMENU%]\Computer Use Reporter.lnk
[%COMMON_STARTUP%]\cure.exe
[%PROGRAM_FILES%]\CUR\CUR.txt
[%PROGRAM_FILES%]\CUR\CURC.exe
[%PROGRAM_FILES%]\CUR\Pointer.html
Computer.Use.Reporter indications of infection
This symptoms of Computer.Use.Reporter detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
Bancos.HGL Trojan Information
Greeting Trojan Removal
brightshare.com Tracking Cookie Cleaner
InCommand.7b2 Backdoor Removal
No comments:
Post a Comment