What is SONAR.Predator!g1?
|
Backdoor
|
Do SONAR.Predator!g1 modifies or delete files?
|
No
|
IS SONAR.Predator!g1 connects Itself To remote server?
|
No
|
Does SONAR.Predator!g1 Alters Safe Mode and System Restore Point?
|
No
|
Can SONAR.Predator!g1 provide unauthorized access To Hackers?
|
Yes
|
Can SONAR.Predator!g1 Result Into DdoS attack ?
|
Yes
|
Can SONAR.Predator!g1 Drop additional malicious files On PC?
|
Yes
|
Trojan Dropped are I-Worm.Neysid, Rimecud.A, Trojanaspx.js.win32, IntLock trojan, Trojan.Sulunch, Trojan.Nessess, Renos.J, Trojan.Downloader.VB.TJ, Trojan.Lena.A, Injector.gen!BF, VBInject.FF, Brontok.E, TROJ_TDSS.ANO, Trojan.Spy.Vb.EH
|
Is it possible for SONAR.Predator!g1 to drop a keylogger into PC?
|
No
|
Do SONAR.Predator!g1 uses Self-Replicating technique?
|
Yes
|
Does It captures keystrokes?
|
Yes
|
DO SONAR.Predator!g1 Monitor Internet Sessions?
|
No
|
Does SONAR.Predator!g1 Lead To “BSOD Error”
|
Yes
|
Does SONAR.Predator!g1 provide superuser-level access to Hackers?
|
Yes
|
Is your System log files accessed by Trojan?
|
No
|
Do Trojan belong to large botnet category?
|
Yes
|
Can SONAR.Predator!g1 search for the specific cookies?
|
No
|
Can It Install spyware and viruses ?
|
Yes
|
Spyware installed by WinXProtector, Adssite ToolBar, SystemGuard, PC Cleaner, Smart Defender Pro, Surf Spy, Email-Worm.Agent.l, HistoryKill, TSPY_AGENT.WWCJ, ICQMonitor, AntiSpywareControl, Spyware.IEPlugin, SchutzTool
|
Does SONAR.Predator!g1 blocks Task Manager and Registry Editor?
|
No
|
Do SONAR.Predator!g1 present itself as a fake screen saver?
|
Yes
|
Does SONAR.Predator!g1 disable the Windows processes and services?
|
No
|
Can SONAR.Predator!g1 disable Windows processes without users awareness?
|
No
|
Does SONAR.Predator!g1 degrade net speed and browsing experience?
|
No
|
Does It perform some unusual browser activity?
|
Yes
|
Do You Notice error message on regular basis Due To Trojan?
|
Yes
|
Windows Error caused by Trojan are – 0x80246004 WU_E_DM_NEEDDOWNLOADREQUEST An operation could not be completed because a download request is required from the download handler., Error 0x80070070 – 0x50011, 0x80242016 WU_E_UH_POSTREBOOTUNEXPECTEDSTATE The state of the update after its post-reboot operation has completed is unexpected., 0x80242FFF WU_E_UH_UNEXPECTED An update handler error not covered by another WU_E_UH_* code. , 0x80244023 WU_E_PT_HTTP_STATUS_GATEWAY_TIMEOUT Same as HTTP status 503 – the request was timed out waiting for a gateway., 0xf0819CBS_E_DUPLICATE_UPDATENAME update name is duplicated in package., 0xf0826 CBS_E_PENDING_VICTIM Package failed to install because another pended package failed., 0x80249004 WU_E_INVENTORY_UNEXPECTED There was an inventory error not covered by another error code., 0x80244027 WU_E_PT_NO_AUTH_PLUGINS_REQUESTED The server returned an empty authentication information list.
|
|
Does SONAR.Predator!g1 affect your system severely?
|
Yes
|
Does SONAR.Predator!g1 intercepts DNS requests?
|
No
|
Does Trojan drop a keylogger Into PC?
|
No
|
DO SONAR.Predator!g1 Keeps hiding its original host location?
|
No
|
Does SONAR.Predator!g1 Disrupts Windows Firewall installed on the PC?
|
Yes
|
Is the bandwidth consumed by SONAR.Predator!g1 maximum?
|
No
|
Does It target government organizations?
|
No
|
Does SONAR.Predator!g1 USE P2P file sharing distribution method?
|
No
|
Does It use Self-Replicating technique?
|
Yes
|
SONAR.Predator!g1 infects wscapi.dll 6.1.7601.17514, msls31.dll 3.10.349.0, comctl32.dll 5.82.6001.18000, localspl.dll 0, odbccr32.dll 3.520.7713.0, cryptui.dll 6.0.6000.16386, winhttp.dll 6.0.6000.16786, WMIsvc.dll 6.0.6002.18005, asferror.dll 11.0.5721.5145, drmstor.dll 9.0.0.3250, shell32.dll 0, msoert2.dll 5.1.2600.0
|
Does SONAR.Predator!g1 open backdoor in infected system?
|
Yes
|
Does It Disables security software on infected system?
|
No
|
Can It Record Keystrokes?
|
Yes
|
How Trojan Monitor Internet Activity On Compromised PC
|
P2p File Sharing
|
Is It possible for Trojan To Encrypt files ?
|
No
|
Is it possible for SONAR.Predator!g1 to Change browser settings?
|
No
|
Can It Steal User Account Information?
|
Yes
|
Does It changes Default System configurations ?
|
Yes
|
Are you seeing fake scan dialog boxes on your screen because of SONAR.Predator!g1?
|
No
|
Does SONAR.Predator!g1 modify or corrupts users System files?
|
No
|
Can Trojan Be Rated on Threat Level?
|
High Risk
|