Need help? Ask the community or hire an expert.
Go to Avira Answers
Date discovered:31/01/2013
In the wild:Yes
Reported Infections:High
Distribution Potential:Low
Damage Potential:Low to medium
Static file:Yes
File size:53.248 Bytes
MD5 checksum:1C4D6D1C7124864C8FEEAD6947F981EA
VDF version: - Thursday, January 31, 2013
IVDF version: - Thursday, January 31, 2013

 General Method of propagation:
   • Email

   •  Kaspersky: Trojan.Win32.Yakes.bxmj
   •  F-Secure: Trojan:W32/Agent.DUIO
   •  Sophos: Troj/Injecto-BT
     Avast: Win32:VBCrypt-CEK [Trj]
   •  Panda: Trj/CI.A
   •  Eset: Win32/Trustezeb.C
     DrWeb: Trojan.DownLoader8.2303
     Fortinet: W32/VB.PCC!tr

Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
    Windows Vista
    Windows Server 2008
    Windows 7

Side effects:
   • Drops malicious files
   • Registry modification

 Files It copies itself to the following locations:
   • %TEMPDIR%\%random%.pre
   • %APPDATA%\%random%\%random%.exe

 Registry The following registry key is added in order to run the process after reboot:

   • "%random%"="%APPDATA%\%random%\%random%.exe"

설명 삽입자 Eric Burk   2013년 2월 2일 토요일
설명 업데이트 Eric Burk   2013년 2월 2일 토요일

뒤로 . . . .
https:// 이 창은 보안을 위해 암호화되었습니다.