Position:home>Virus wind vane> 17 days of early-warning: Careful " the hacker downloads a tool "
17 days of early-warning: Careful " the hacker downloads a tool "
From;  Author:Stand originally

“ hacker is long-range tool 286720”(Win32.Hack.Agent.fs.286720) , this is program of a hacker. The meeting after it enters a system builds back door, the long-range server that joins virus author is appointed stealthily, help virus author controls user computer illegally.

“ bedlamite downloads implement 106496”(Win32.Troj.DownLoader.wd.106496) , this is download of a trojan implement. It has the function of antagonism safety software, meet those who destroy a few safe software move, download other virus file to move in user computer next.

One, “ hacker is long-range tool 286720”(Win32.Hack.Agent.fs.286720) minatory level: ★

This hacker program appears of late more mutation, nevertheless poison bully all can be checked kill, the computer user that already installed poison bully need not worry surely. Did not install the user of poison bully, notice vigilance please.

It is in after entering a system, in releasing document of oneself a virus %WINDOWS%TEMP list, name for Yxa0999.tmp. Sample.exe of another virus file can be parted to release %WINDOWS%SYSTEM32 catalog and system dish below root catalog. The main body of a court verdict that Sample.exe is virus, it can be written register a watch to start, help virus implementation switchs on the mobile phone to be started oneself.

Move after rising, the process of browser of virus infuse IE, backstage joins stealthily designation long-range server Fei******888.3322.org, to the hacker hair discrepancy invades successful report, await new statement. Here poisonous help falls, the hacker can realize the complete control of pair of user systems.

About the labor report of this virus, can be in golden hill virus consults in 100 divisions greatly Http://vi.duba.net/virus/win32-hack-agent-fs-286720-50812.html

2, “ bedlamite downloads implement 106496”(Win32.Troj.DownLoader.wd.106496) minatory level: ★ ★

Poison bully turns over virus engineer discovery, this poisonous author is aimed at the golden hill with domestic computer commonly used user the software reducing toxin such as star of poison bully, luck, Kabasiji, installed antagonism function to virus. After it enters user computer, can search afore-mentioned a few kill soft process, the attempt shuts them, execute download mission next.

As to the download behavior of virus, download with other implement not how old difference. After it enters a system, can release many virus document, among them the Winscksow.dll that main file has %WINDOWS%system32 catalog to fall, the Avpnoackdf.exe below %WINDOWS%system32drivers catalog and Rsdbdt.sys. Keep oneself data next register a watch, add serve for the system, implementation switchs on the mobile phone to be started oneself.

If can move,rise, virus can be searched in the system and the attempt shuts golden hill the software reducing toxin such as star of poison bully, luck, Kabasiji, and safe and auxiliary software the process of 360 safe bodyguard. The address that joins Http://m**p.lovemmll.cn is appointed this by virus author next, download list of a virus, download more other virus again according to among them address.
Previous12 Next