Find a Partner
This window is encrypted for your security.
Need help? Ask the community or hire an expert.
Go to Avira Answers
In the wild:
APPL/ - Application
This class of detection flags applications that if used unproperly or with malicious intent might damage or compromise security on the local system, remote systems or network infrastructure. These are legitimate applications that can be used to extract protected information, provide remote access to the local machine, modify advanced system settings or perform advanced operating system or networking functions.
This detection doesn't mean that the file is malicious. However, if the file got on the system without the user's knowledge the system's security might be compromised.
Disabling this detection is recommended for advanced users that understand the risks and how to use these applications.
Method of propagation:
• No own spreading routine
• Kaspersky: not-a-virus:AdWare.Win32.Agent.ahbx
• Eset: Win32/BrowseFox.F application
• DrWeb: Trojan.BPlug.27
Platforms / OS:
• Windows XP
• Windows 2003
• Windows Vista
• Windows Server 2008
• Windows 7
• Drops files
• Registry modification
It creates the following directory:
The following registry keys are added:
• HRZR_EHACNGU:P:\Qbxhzragr haq Rvafgryyhatra\Nqzva\Qrfxgbc\28095393_574q5863.rkr
The malware program was written in MS Visual C++.
In order to aggravate detection and reduce size of the file it is packed with the following runtime packer:
Description inserted by Oscar Anduiza on Tuesday, April 22, 2014
Description updated by Oscar Anduiza on Tuesday, April 22, 2014