Technical details:
Categories: Trojan
[Kaspersky]Trojan.Proxy.Win32.Lager.ch,Trojan-Prox.Win32.Lager.dt;
[Other]W32/Crypt.gen4,TROJ_LAGER.AR
Lager Files:
[%PROFILE_TEMP%]\WER54.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER55.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER56.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER57.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER58.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER59.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5A.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5B.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5C.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5D.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5E.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5F.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER60.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER61.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER62.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER63.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER64.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER65.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER66.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER67.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER68.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER69.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER6A.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER54.tmp
[%PROFILE_TEMP%]\WER55.tmp
[%PROFILE_TEMP%]\WER56.tmp
[%PROFILE_TEMP%]\WER57.tmp
[%PROFILE_TEMP%]\WER58.tmp
[%PROFILE_TEMP%]\WER59.tmp
[%PROFILE_TEMP%]\WER5A.tmp
[%PROFILE_TEMP%]\WER5B.tmp
[%PROFILE_TEMP%]\WER5C.tmp
[%PROFILE_TEMP%]\WER5D.tmp
[%PROFILE_TEMP%]\WER5E.tmp
[%PROFILE_TEMP%]\WER5F.tmp
[%PROFILE_TEMP%]\WER60.tmp
[%PROFILE_TEMP%]\WER61.tmp
[%PROFILE_TEMP%]\WER62.tmp
[%PROFILE_TEMP%]\WER63.tmp
[%PROFILE_TEMP%]\WER64.tmp
[%PROFILE_TEMP%]\WER65.tmp
[%PROFILE_TEMP%]\WER66.tmp
[%PROFILE_TEMP%]\WER67.tmp
[%PROFILE_TEMP%]\WER68.tmp
[%PROFILE_TEMP%]\WER69.tmp
[%PROFILE_TEMP%]\WER6A.tmp
[%PROFILE_TEMP%]\WER54.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER55.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER56.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER57.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER58.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER59.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5A.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5B.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5C.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5D.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5E.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5F.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER60.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER61.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER62.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER63.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER64.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER65.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER66.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER67.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER68.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER69.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER6A.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER54.tmp
[%PROFILE_TEMP%]\WER55.tmp
[%PROFILE_TEMP%]\WER56.tmp
[%PROFILE_TEMP%]\WER57.tmp
[%PROFILE_TEMP%]\WER58.tmp
[%PROFILE_TEMP%]\WER59.tmp
[%PROFILE_TEMP%]\WER5A.tmp
[%PROFILE_TEMP%]\WER5B.tmp
[%PROFILE_TEMP%]\WER5C.tmp
[%PROFILE_TEMP%]\WER5D.tmp
[%PROFILE_TEMP%]\WER5E.tmp
[%PROFILE_TEMP%]\WER5F.tmp
[%PROFILE_TEMP%]\WER60.tmp
[%PROFILE_TEMP%]\WER61.tmp
[%PROFILE_TEMP%]\WER62.tmp
[%PROFILE_TEMP%]\WER63.tmp
[%PROFILE_TEMP%]\WER64.tmp
[%PROFILE_TEMP%]\WER65.tmp
[%PROFILE_TEMP%]\WER66.tmp
[%PROFILE_TEMP%]\WER67.tmp
[%PROFILE_TEMP%]\WER68.tmp
[%PROFILE_TEMP%]\WER69.tmp
[%PROFILE_TEMP%]\WER6A.tmp
Lager indications of infection
This symptoms of Lager detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
Remove Bancos!generic Trojan
Removing Sin.Cyn Backdoor
No comments:
Post a Comment