Technical details:
Categories: Trojan,Backdoor,RAT
[Kaspersky]Backdoor.DTR.13.a,Backdoor.DTR.10.a,Backdoor.DTR.14.d,Backdoor.DTR.142.a,Backdoor.DTR.142.c,Backdoor.DTR.10.b,Backdoor.DTR.144.a,Backdoor.DTR.144.c,Backdoor.DTR.144.h,Backdoor.DTR.144.i,Backdoor.DTR.143,Backdoor.DTR.15.b,Backdoor.DTR.15.d,Backdoor.DTR.15.e,Backdoor.DTR.15.f,Backdoor.DTR.15.a,Backdoor.DTR.15.g,Backdoor.DTR.16.a;
[Eset]Win32/DTR.10 trojan,Win32/DTR.16 trojan,Win32/DTR.14.C trojan,Win32/DTR.144.I trojan;
[McAfee]BackDoor-WF,BackDoor-WF.svr;
[F-Prot]security risk or a "backdoor" program,destructive program,security risk named W32/DTR144.C,security risk named W32/DTR15.D,security risk named W32/DTR15.B,security risk named W32/DTR15.C,security risk named W32/DTR15.A;
[Panda]Backdoor Program,Backdoor Program.LC,Bck/Dtr,Bck/DTR.144.h,Trojan Horse,Bck/DTR.15,Bck/DTR.15.f;
[Computer Associates]Backdoor/Dtr.13,Backdoor/DTR.13.a,Win32.DTR.13,Backdoor/DTR.10,Win32.DTR.10,Backdoor/DTR.141!DLL,Backdoor/DTR.142.A,Win32.DTR.141,Win32.DTR.142,Win32/Dtr.142!Trojan,Backdoor/DTR.10.b!Server,Backdoor/DTR.144.a,Backdoor/DTR,Backdoor/DTR.1_4_4,Backdoor/DTR.1_44_I,Backdoor/Dtr.144,Backdoor/DTR.144.B!Server,Win32.DTR.144,Win32.DTR.144.B,Backdoor/DTR.143.DTrivDLL,Win32.DTR.143,Backdoor/DTR.1_5,Backdoor/DTR.15.b!Server,Backdoor/DTR.15.d!Server,Backdoor/DTR.15.e!Server,Backdoor/DTR.15!Server,Backdoor/DTR.15.A!Server,Backdoor/DTR.15F!Server,Backdoor/DTR.16!Server,Backdoor/DTR.141.B,Win32.DTR.141.B,Backdoor/DTR.144.i
DTr Files:
[%WINDOWS%]\system\dtriv.dat
[%WINDOWS%]\system\dtrivk.dll
[%WINDOWS%]\system\dtrv.dat
[%WINDOWS%]\system\dtrvk.dll
[%WINDOWS%]\system\nb003.exe
[%WINDOWS%]\system\nbsystem.exe
[%WINDOWS%]\system\dtriv.dat
[%WINDOWS%]\system\dtrivk.dll
[%WINDOWS%]\system\dtrv.dat
[%WINDOWS%]\system\dtrvk.dll
[%WINDOWS%]\system\nb003.exe
[%WINDOWS%]\system\nbsystem.exe
DTr Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shellserviceobjectdelayload
DTr indications of infection
This symptoms of DTr detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
Pigeon.ETO Trojan Information
PrankMaster Trojan Symptoms
Jodeitor RAT Removal instruction
PC.Eyes Spyware Information
Win32.Memleak Trojan Removal instruction