Main Menu
Contact Us

Katien.n Backdoor Information

Name: Katien.n
Category: Backdoor
Advice: Remove
Risk: Severe Risk Severe threats typically are remotely exploitable vulnerabilities, which can lead to system compromise. Successful exploitation does not normally require any interaction and exploits are in the wild. There exists a high possibility of potential system damage or security flaw. Attacker has complete control over your computer or install new software on your machine.

Signatures: process: iexplore.exe: MD5 Hash: 9a661441cf7cd1bbb00... process: iexplore.exe: MD5 Hash: ... process: iexplore.exe: MD5 Hash: 6ab9016f88a6554d4a7... process: iexplore.exe: MD5 Hash: ..
Type: Backdoor - A backdoor is a means of access to a computer program that bypasses any computer security mechanisms. Computer attackers often use backdoors as part of an exploit or Trojan to gain access to a user's computer. In some cases, a worm is designed to take advantage of a backdoor created by an earlier attack.

Top Backdoor Visited Pages:
Unicorn - 267 visits
Blue Eye IRC Bot V 2.0 - 206 visits
SkatanBot - Alias: Backdoor.VB.kl - 137 visits
Backdoor:Win32/Lamebot.A - 125 visits
Backdoor.Perl.AEI.16 - 106 visits
RBot.sysdat - Alias: Backdoor:Win32/Rbot!E89C - 106 visits
Trojan.Backdoor.Darkmoon - Alias: Backdoor:Win32/Darkmoon.AZ - 104 visits - Alias: RVP - 102 visits
Trojan.Fakespy.A - Alias: Trojan.Zlob.B - 100 visits
BackDoor.Galapop.A - Alias: Trojan.Abwiz.D (Symantec), Galapoper (Mcafee) - 99 visits

Random Backdoor Pages:
Trojan.ntddetect - Alias: Troj/Agent-CU
RBot.navupdaterx - Alias: Backdoor:Win32/Rbot.EV
Background Intelligent Transfer Service - Alias: Beat IT Security, BITS
Neo Trojan


2006-2008 - Privacy Policy