Categories: Trojan
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.
Visible Symptoms:
Files in system folders:
[%COMMON_DESKTOPDIRECTORY%]\Shortcut to ScreenNameHacker.exe.LNK
[%COMMON_PROGRAMS%]\Inersoft\Screem Name HACKER\Shortcut to ScreenNameHacker.exe.LNK
[%COMMON_PROGRAMS%]\Inersoft\Screem Name HACKER\Uninstall Screem Name HACKER.LNK
[%COMMON_STARTUP%]\Shortcut to WINDOWXP.exe.LNK
[%WINDOWS%]\ScreenNameHacker.exe
[%WINDOWS%]\Uninstall Screem Name HACKER.LNK
[%COMMON_DESKTOPDIRECTORY%]\Shortcut to ScreenNameHacker.exe.LNK
[%COMMON_PROGRAMS%]\Inersoft\Screem Name HACKER\Shortcut to ScreenNameHacker.exe.LNK
[%COMMON_PROGRAMS%]\Inersoft\Screem Name HACKER\Uninstall Screem Name HACKER.LNK
[%COMMON_STARTUP%]\Shortcut to WINDOWXP.exe.LNK
[%WINDOWS%]\ScreenNameHacker.exe
[%WINDOWS%]\Uninstall Screem Name HACKER.LNK
How to detect ScreenNameHackerV1:
Files:
[%COMMON_DESKTOPDIRECTORY%]\Shortcut to ScreenNameHacker.exe.LNK
[%COMMON_PROGRAMS%]\Inersoft\Screem Name HACKER\Shortcut to ScreenNameHacker.exe.LNK
[%COMMON_PROGRAMS%]\Inersoft\Screem Name HACKER\Uninstall Screem Name HACKER.LNK
[%COMMON_STARTUP%]\Shortcut to WINDOWXP.exe.LNK
[%WINDOWS%]\ScreenNameHacker.exe
[%WINDOWS%]\Uninstall Screem Name HACKER.LNK
[%COMMON_DESKTOPDIRECTORY%]\Shortcut to ScreenNameHacker.exe.LNK
[%COMMON_PROGRAMS%]\Inersoft\Screem Name HACKER\Shortcut to ScreenNameHacker.exe.LNK
[%COMMON_PROGRAMS%]\Inersoft\Screem Name HACKER\Uninstall Screem Name HACKER.LNK
[%COMMON_STARTUP%]\Shortcut to WINDOWXP.exe.LNK
[%WINDOWS%]\ScreenNameHacker.exe
[%WINDOWS%]\Uninstall Screem Name HACKER.LNK
Registry Keys:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\screem name hacker
Removing ScreenNameHackerV1:
You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.
Or buy it to remove ALL viruses from your computer.Also Be Aware of the Following Threats:
No comments:
Post a Comment