Categories: Worm
Worms can be classified according to the propagation method they use,
i.e. how they deliver copies of themselves to new victim machines.
Worms can also be classified by installation method, launch method and finally according
to characteristics standard to all malware: polymorphism, stealth etc.
Many of the worms which managed to cause significant outbreaks use more then
one propagation method as well as more than one infection technique.
The methods are listed separately below.
[Kaspersky]Trojan-Downloader.NSIS.Agent.ac;
[Panda]Trj/Downloader.OZE;
[Other]Win32.ExplorerHijack,DLoader.CLIF
How to detect uTorrent:
Folders:
[%APPDATA%]\uTorrent
Registry Keys:
HKEY_CLASSES_ROOT\clsid\{77ae90a3-daf3-429b-9e3f-fa1252467579}
Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
Removing uTorrent:
You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.
Or buy it to remove ALL viruses from your computer.Also Be Aware of the Following Threats:
Desktop.Personal Spyware Removal
Remove PWS.Banker.gen Trojan
Caiijing Trojan Removal
BT Trojan Symptoms
Remove Webdir.b Adware
No comments:
Post a Comment