Categories: Backdoor
Backdoors are used by virus writers to detect and download confidential information,
execute malicious code, destroy data, include the machine in bot networks and so forth.
[Kaspersky]Trojan-Proxy.Win32.Small.bt;
[McAfee]Generic Proxy.c;
[F-Prot]W32/Trojan.DCI;
[Other]Win32/Choprox.F,Trojan Horse,TrojanProxy:Win32/Small,W32/Smalltroj.BOB,TROJ_PROXY.AC,Troj/Stox-E,Krepper,trojan-backdoor-traffstore
How to detect Choprox:
Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
Removing Choprox:
You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.
Or buy it to remove ALL viruses from your computer.Also Be Aware of the Following Threats:
IconDrop Trojan Symptoms
Caiijing Trojan Information
Other Downloader Information
Druvil Trojan Removal
XSRemover Trojan Information
No comments:
Post a Comment