Need help? Ask the community or hire an expert.
Go to Avira Answers
Date discovered:09/12/2010
In the wild:No
Reported Infections:Low
Distribution Potential:Low to medium
Damage Potential:Low
File size:258560 Bytes
MD5 checksum:dfe23ad3d50c1cf45ff222842c7551ae
VDF version:
IVDF version:

 General Method of propagation:
   • No own spreading routine

   •  Kaspersky: Trojan.Win32.Bublik.iez
   •  Eset: a variant of Win32/Injector.XHP trojan
   •  DrWeb: Trojan.Packed.23284

Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows Server 2008
   • Windows 7

Side effects:
   • Registry modification

 Files It copies itself to the following location:
   • %SYSDIR%\wmpsl64.exe

 Registry One of the following values is added in order to run the process after reboot:

–  [HKLM\Software\Microsoft\Windows\CurrentVersion\Run]
   • "Windows Media Scheduler"="c:\windows\\system32\\wmpsl64.exe"

The following registry keys are added in order to load the services after reboot:

– [HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\
   • "c:\windows\\system32\\wmpsl64.exe"="c:\windows\\system32\\wmpsl64.exe:*:Enabled:Windows Media Scheduler"

– [HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\
   • "c:\windows\\system32\\wmpsl64.exe"="c:\windows\\system32\\wmpsl64.exe:*:Enabled:Windows Media Scheduler"

 Miscellaneous Event handler:
It creates the following Event handlers:
   • WriteProcessMemory
   • CreateRemoteThread
   • createProcess
   • CreateFile
   • GetDriveType

Furthermore it contains the following strings:
   • JOIN
   • NICK
   • PASS
   • USER

Description inserted by Wensin Lee on Thursday, October 4, 2012
Description updated by Wensin Lee on Thursday, October 4, 2012

Back . . . .