Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:ADWARE/Megone.A
Date discovered:07/10/2013
Type:Adware/Spyware
In the wild:No
Reported Infections:Low to medium
Distribution Potential:Low
Damage Potential:Low
VDF version:7.11.106.18 - Monday, October 7, 2013
IVDF version:7.11.106.18 - Monday, October 7, 2013

 General ADWARE/ - Adware

This class of detection flags software that display ads, usually in the internet browser by modifying displayed pages or opening aditional pages with ads. These adware programs are usually installed by the users themselves or come with other software that the users install themselves (usually in exchange for using the software for free or as a default install option).

Users might be unaware that this software was installed or of its behaviour. This detection is meant to flag the file and the behaviour as part of legitimate ad displaying software.

This detection can be disabled and is recommended if the user is aware of the software installed on his/her system and doesn't want this type of software to be detected.
Method of propagation:
   • No own spreading routine


Aliases:
   •  Kaspersky: Trojan-Downloader.Win32.Genome.eyek
     AVG: Win32/DH{WBIuICIlV05k}


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
    Windows Vista
    Windows Server 2008
    Windows 7


Side effects:
   • Records keystrokes

 Files – Temporary files that might be deleted afterwards:
   • %temp%\nskF.tmp
   • %temp%\nsk10.tmp
   • %temp%\nsz11.tmp
   • %temp%\nsz11.tmp\inetc.dll
   • %temp%\nsz11.tmp\cbsidlm-kmp2-KMP-v13327782.exe

 Registry The following registry keys are added in order to load the services after reboot:

[HKLM\SYSTEM\ControlSet001\Control\Session Manager]
   • "PendingFileRenameOperations"="\??\%temp%\nsz11.tmp\cbsidlm-kmp2-KMP-v13327782.exe;"

[HKLM\SYSTEM\ControlSet001\Control\ServiceCurrent]
   • @=dword:0000000a



The following registry key is added:

[HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_MSISERVER\0000\Control]
   • "ActiveService"="MSIServer"

 Miscellaneous Internet connection:
In order to check for its internet connection the following DNS servers are contacted:
   • software-**********-a.cnet.com
   • i.i.cb**********.com
   • img.cb**********.com
   • track.mypc**********up.com
   • cdn.mypc**********up.com
   • dw.cb**********.com

 File details Programming language:
The malware program was written in Delphi.

Description inserted by Wensin Lee on Friday, October 11, 2013
Description updated by Wensin Lee on Friday, October 11, 2013

Back . . . .