Tuesday, October 20, 2009

Conflicker.B Spam Trojan comes from spam

Conflicker.B Spam Trojan, Generic FakeAlert.a, TrojanDownloader:Win32/FakeRean, Adware/AntivirusPro2010, Mal/EncPk-KP, Trojan.FakeAV, TROJ_FAKEAV.BLV, Win32:Trojan-gen Generic15.CWZ, Trojan.Downloader.FakeAV.DV are the names designating one and same trojan downloader. There are several reviews at reliable websites in the web describing that troajn. The malware observers have named this trojan according to the subject of spam message, which is a start point of this trojan trickery. The subject of the massage reads as follows: “Conflicker.B Infection Alert”. Therefore, the related trojan is referred to as Conflicker.B Infection Trojan.
The best way to remove Conflicker.B Infection Trojan is to avoid downloading Conflicker.B Infection Trojan as you might have been invited by the spam massage which has been dispatched to millions of mailboxes. The massage is undersigned by Microsoft Windows Agent. It is understood that was not Microsoft that approved, or was responsible for, the spamming. It was the same hackers who developed and distributed Antivirus Pro 2010 who spammed the Conflicker.B Infection Alert.
The main predestination of Conflicker.B Infection Trojan is to drop Antivirus Pro 2010 adware into targeted computer system. Once the adware implanted, the trojan supports it generating fake alerts, which prompt a user of infected PC to buy full version of Antivirus Pro 2010.
To get rid of Conflicker.B Infection Trojan covering all possible infections downloaded thanking to its assistance or in no relation to it, click here to start the trojan of Conflicker.B Infection removal.

Conflicker.B Spam Trojan removal tool:
Conflicker.B Spam Trojan manual removal guide:
Delete Conflicker.B Spam Trojan files:
Delete Conflicker.B Spam Trojan registry entries:
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Download “RunInvalidSignatures” = “1″
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations “LowRiskFileTypes” = “zip;.rar;.cab;.txt;.exe;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mov;.mp3;.wav”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations “SaveZoneInformation” = “1″
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer “ForceClassicControlPanel” = “1″
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Download “CheckExeSignatures” = “no”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “mserv”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “svchost”
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run “Antivirus Pro 2010″

No comments: