Need help? Ask the community or hire an expert.
Go to Avira Answers
Date discovered:27/09/2012
In the wild:No
Reported Infections:Medium
Distribution Potential:Low
Damage Potential:Low
VDF version:
IVDF version:

 General Method of propagation:
   • No own spreading routine

   •  Microsoft: Adware:Win32/Babylon
   •  Eset: Win32/Adware.Bundlore application

Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows Server 2008
   • Windows 7

Side effects:
   • Registry modification

Right after execution the following information is displayed:

 Files The following files are created:

– Non malicious files:
   • %temp%\nsw5.tmp\Single_BABYLON.ini; %temp%\nsw5.tmp\Single_Conduit.ini;
      %temp%\nsw5.tmp\Single_incr.ini; %temp%\nsw5.tmp\Single_mood_dply.ini;
      %temp%\nsw5.tmp\Single_swim.ini; %temp%\nsw5.tmp\Single_swim.prev.ini;
      %temp%\nsw5.tmp\Single_vgmt.ini; %temp%\nsw5.tmp\ask1.ini;
      %temp%\nsw5.tmp\safeWeber.ini; %temp%\nsw5.tmp\BabylonToolbar.bmp;
      %temp%\nsw5.tmp\ConduitToolbar.bmp; %temp%\nsw5.tmp\ToolbarASK.bmp;
      %temp%\nsw5.tmp\ToolbarSafeWeber.bmp; %temp%\nsw5.tmp\ask.bmp;
      %temp%\nsw5.tmp\facemoodsToolbar.bmp; %temp%\nsw5.tmp\incr.bmp;
      %temp%\nsw5.tmp\swim.bmp; %temp%\nsw5.tmp\swl.bmp; %temp%\nsw5.tmp\win.bmp;
      %temp%\nsw5.tmp\swim_logo.jpg; %temp%\nsw5.tmp\modern-wizard.bmp;

– Temporary files that might be deleted afterwards:
   • %temp%\nsh3.tmp
   • %temp%\nsh5.tmp

 Registry The following registry keys are added in order to load the service after reboot:

– [HKLM\SYSTEM\ControlSet001\Control\Session Manager]
   • "PendingFileRenameOperations"="\??\%temp%\nsf5.tmp\;"

 Miscellaneous Internet connection:
In order to check for its internet connection the following DNS server is contacted:
   • track.**********

Description inserted by Wensin Lee on Monday, October 8, 2012
Description updated by Wensin Lee on Monday, October 8, 2012

Back . . . .