Categories: Trojan,Backdoor
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.
Backdoors are the most dangerous type of Trojans and the most popular.
Backdoors open infected machines to external control via Internet.
Often the backdoor will not be visible in the log of active programs.
[Eset]Win32/Jeemp.C trojan;
[Panda]Bck/Jeem;
[Computer Associates]Backdoor/Jeem.C,Win32.Jeem.C,Win32/Jeem.C.Trojan
Visible Symptoms:
Files in system folders:
[%SYSTEM%]\msrexe.exe
[%WINDOWS%]\system\msrexe.exe
[%SYSTEM%]\msrexe.exe
[%WINDOWS%]\system\msrexe.exe
How to detect Jeem:
Files:
[%SYSTEM%]\msrexe.exe
[%WINDOWS%]\system\msrexe.exe
[%SYSTEM%]\msrexe.exe
[%WINDOWS%]\system\msrexe.exe
Registry Keys:
HKEY_LOCAL_MACHINE\system\controlset001\services\swartax
Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\welcome
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\welcome
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\welcome
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\welcome
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\welcome
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\welcome
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\welcome
Removing Jeem:
You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.
Or buy it to remove ALL viruses from your computer.Also Be Aware of the Following Threats:
123cha.com Trojan Information
Bancos.IJG Trojan Symptoms
No comments:
Post a Comment