Technical details:
Categories: Trojan,Hacker Tool
[Kaspersky]Trojan.PSW.Coced.236,Trojan.PSW.Coced.236.a,Trojan.PSW.Coced.236.b,Trojan.PSW.Coced.236.d;
[McAfee]PWS-BM.cfg,PWS-BM.gen;
[F-Prot]destructive program,security risk or a "backdoor" program;
[Panda]Trj/Coced.236,Trj/PSW.Coced.236.b,Trj/PSW.Coced.236.D;
[Computer Associates]Win32/Coced.236.1!PWS!Trojan,Win32/Coced.236.B1!PWS!Trojan,Win95/Coce2225!Dropper
PWS.BM.cfg indications of infection
This symptoms of PWS.BM.cfg detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
Agent.bg Trojan Removal instruction
No comments:
Post a Comment