¿Necesita ayuda? Pregunte a la comunidad o contrate a un experto.
Ir a Avira Answers
Virus:Adware/InstallMate.A
Date discovered:10/09/2012
Type:Adware/Spyware
In the wild:No
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Low
File size:299.464 Bytes
MD5 checksum:f3c39c8a0D0B310664e463aa7816d621
VDF version:7.11.42.116 - Monday, September 10, 2012
IVDF version:7.11.42.116 - Monday, September 10, 2012

 General Method of propagation:
   • No own spreading routine


Alias:
   •  Eset: Win32/InstallMate application


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows Server 2008
   • Windows 7


Side effects:
   • Registry modification


Right after execution the following information is displayed:


 Files It renames the following files:

    •  %TEMP%\ping.txt.tmp into %TEMP%\ping.txt
    •  %ALLUSERSPROFILE%\Application Data\InstallMate\1DBDA844\cfg\1.ini.tmp into %ALLUSERSPROFILE%\Application Data\InstallMate\1DBDA844\cfg\1.ini
    •  %TEMP%\{20522427-FF15-260A-C4E1-B737FBB106D1}\general_logo.jpg.tmp into %TEMP%\{20522427-FF15-260A-C4E1-B737FBB106D1}\general_logo.jpg
    •  %ALLUSERSPROFILE%\Application Data\InstallMate\1DBDA844\cfg\2.ini.tmp into %ALLUSERSPROFILE%\Application Data\InstallMate\1DBDA844\cfg\2.ini
    •  %ALLUSERSPROFILE%\Application Data\InstallMate\1DBDA844\cfg\3.ini.tmp into %ALLUSERSPROFILE%\Application Data\InstallMate\1DBDA844\cfg\3.ini
    •  %TEMP%\{20522427-FF15-260A-C4E1-B737FBB106D1}\incredibar_toolbar3.jpg.tmp into %TEMP%\{20522427-FF15-260A-C4E1-B737FBB106D1}\incredibar_toolbar3.jpg
    •  %ALLUSERSPROFILE%\Application Data\InstallMate\1DBDA844\cfg\3_1.ini.tmp into %ALLUSERSPROFILE%\Application Data\InstallMate\1DBDA844\cfg\3_1.ini
    •  %ALLUSERSPROFILE%\Application Data\InstallMate\1DBDA844\cfg\4_1.ini.tmp into %ALLUSERSPROFILE%\Application Data\InstallMate\1DBDA844\cfg\4_1.ini
    •  %ALLUSERSPROFILE%\Application Data\InstallMate\1DBDA844\cfg\4_2.ini.tmp into %ALLUSERSPROFILE%\Application Data\InstallMate\1DBDA844\cfg\4_2.ini
    •  %ALLUSERSPROFILE%\Application Data\InstallMate\1DBDA844\cfg\5.ini.tmp into %ALLUSERSPROFILE%\Application Data\InstallMate\1DBDA844\cfg\5.ini
    •  %ALLUSERSPROFILE%\Application Data\InstallMate\1DBDA844\cfg\6.ini.tmp into %ALLUSERSPROFILE%\Application Data\InstallMate\1DBDA844\cfg\6.ini
    •  %TEMP%\{20522427-FF15-260A-C4E1-B737FBB106D1}\Addons\download_save.exe.tmp into %TEMP%\{20522427-FF15-260A-C4E1-B737FBB106D1}\Addons\download_save.exe
    •  %ALLUSERSPROFILE%\Application Data\InstallMate\1DBDA844\cfg\7.ini.tmp into %ALLUSERSPROFILE%\Application Data\InstallMate\1DBDA844\cfg\7.ini
    •  %ALLUSERSPROFILE%\Application Data\InstallMate\1DBDA844\cfg\7_1.ini.tmp into %ALLUSERSPROFILE%\Application Data\InstallMate\1DBDA844\cfg\7_1.ini
    •  %TEMP%\{20522427-FF15-260A-C4E1-B737FBB106D1}\Addons\OptimizerProInstaller.exe.tmp into %TEMP%\{20522427-FF15-260A-C4E1-B737FBB106D1}\Addons\OptimizerProInstaller.exe
    •  %ALLUSERSPROFILE%\Application Data\InstallMate\1DBDA844\cfg\7_1_1.ini.tmp into %ALLUSERSPROFILE%\Application Data\InstallMate\1DBDA844\cfg\7_1_1.ini



The following files are created:

– Non malicious files:
   • %TEMP%\Tsu-07F4.dll
   • %TEMP%\{20522427-FF15-260A-C4E1-B737FBB106D1}\_Setup.dll
   • %TEMP%\{20522427-FF15-260A-C4E1-B737FBB106D1}\Setup.ico
   • %TEMP%\{20522427-FF15-260A-C4E1-B737FBB106D1}\_Setupx.dll
   • %TEMP%\{20522427-FF15-260A-C4E1-B737FBB106D1}\Setup.exe

 Registry The following registry key is added:

– [HKCU\Software\Optimizer Pro\wpdata]
   • "publisher"="34"
   • "date"="2012/09/12"

 Miscellaneous Internet connection:
In order to check for its internet connection the following DNS servers are contacted:
   • www.nlstor**********.info
   • www.repor**********.info
   • plug**********.info


Checks for an internet connection by contacting the following web site:
   • plug**********.info/?extension=dnsave&publisher=34&country=TW&install_date=20110101

Descripción insertada por Wensin Lee el miércoles, 12 de septiembre de 2012
Descripción actualizada por Wensin Lee el miércoles, 12 de septiembre de 2012

Volver . . . .
https:// Esta ventana está cifrada para su seguridad.