Need help? Ask the community or hire an expert.
Go to Avira Answers
Date discovered:27/09/2012
In the wild:No
Reported Infections:Medium
Distribution Potential:Low
Damage Potential:Low
VDF version: - Thursday, September 27, 2012
IVDF version: - Thursday, September 27, 2012

 General Method of propagation:
   • No own spreading routine

     Microsoft: Adware:Win32/Babylon
   •  Eset: Win32/Adware.Bundlore application

Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
    Windows Vista
    Windows Server 2008
    Windows 7

Side effects:
   • Registry modification

Right after execution the following information is displayed:

 Files The following files are created:

Non malicious files:
   • %temp%\nsw5.tmp\Single_BABYLON.ini; %temp%\nsw5.tmp\Single_Conduit.ini;
      %temp%\nsw5.tmp\Single_incr.ini; %temp%\nsw5.tmp\Single_mood_dply.ini;
      %temp%\nsw5.tmp\Single_swim.ini; %temp%\nsw5.tmp\Single_swim.prev.ini;
      %temp%\nsw5.tmp\Single_vgmt.ini; %temp%\nsw5.tmp\ask1.ini;
      %temp%\nsw5.tmp\safeWeber.ini; %temp%\nsw5.tmp\BabylonToolbar.bmp;
      %temp%\nsw5.tmp\ConduitToolbar.bmp; %temp%\nsw5.tmp\ToolbarASK.bmp;
      %temp%\nsw5.tmp\ToolbarSafeWeber.bmp; %temp%\nsw5.tmp\ask.bmp;
      %temp%\nsw5.tmp\facemoodsToolbar.bmp; %temp%\nsw5.tmp\incr.bmp;
      %temp%\nsw5.tmp\swim.bmp; %temp%\nsw5.tmp\swl.bmp; %temp%\nsw5.tmp\win.bmp;
      %temp%\nsw5.tmp\swim_logo.jpg; %temp%\nsw5.tmp\modern-wizard.bmp;

– Temporary files that might be deleted afterwards:
   • %temp%\nsh3.tmp
   • %temp%\nsh5.tmp

 Registry The following registry keys are added in order to load the service after reboot:

[HKLM\SYSTEM\ControlSet001\Control\Session Manager]
   • "PendingFileRenameOperations"="\??\%temp%\nsf5.tmp\;"

 Miscellaneous Internet connection:
In order to check for its internet connection the following DNS server is contacted:
   • track.**********

설명 삽입자 Wensin Lee   2012년 10월 8일 월요일
설명 업데이트 Wensin Lee   2012년 10월 8일 월요일

뒤로 . . . .
https:// 이 창은 보안을 위해 암호화되었습니다.