Need help? Ask the community or hire an expert.
Go to Avira Answers
Date discovered:18/02/2013
Type:Security Privacy Risk
In the wild:No
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Low
File size:13824 Bytes
MD5 checksum:aea7fd5cdf27aa3b90b7baa79531b023
VDF version:
IVDF version:

 General SPR/ - Security/Privacy Risk

This class of detection flags applications that if used unproperly or with malicious intent might damage or compromise security on the local system, remote systems or network infrastructure. These are legitimate applications that can be used to extract protected information, provide remote access to the local machine, modify advanced system settings or perform advanced operating system or networking functions.

This detection doesn't mean that the file is malicious. However, if the file got on the system without the user's knowledge the system's security might be compromised.

Disabling this detection is recommended for advanced users that understand the risks and how to use these applications.

Method of propagation:
   • No own spreading routine

   •  Eset: Win32/Toolbar.Linkury.A potentially unwanted
   •  DrWeb: Trojan.MulDrop4.24551

Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows Server 2008
   • Windows 7

Side effects:
   • Registry modification

 Miscellaneous String:
Furthermore it contains the following strings:
   • start /MIN /wait
   • quiet RESTART=1
   • quiet RESTART=0
   • Smartbar.exe
   • restart

 File details Programming language:
The malware program was written in MS Visual C#.

Description inserted by Wensin Lee on Monday, February 18, 2013
Description updated by Bernd Aufrecht on Monday, March 9, 2015

Back . . . .