Нужен совет? Обратитесь за помощью к сообществу или специалистам.
Перейти к Avira Answers
Date discovered:27/10/2010
In the wild:Yes
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Medium
Static file:Yes
File size:92.672 Bytes
MD5 checksum:074183cd048fbf01163d14d621fa73e4
VDF version:
IVDF version:

 General Method of propagation:
   • No own spreading routine

   •  Symantec: Downloader
   •  Kaspersky: Worm.Win32.Bybz.cza
   •  TrendMicro: WORM_OTORUN.FJE
   •  Avast: Win32:Inject-ACU

Platforms / OS:
   • Windows 95
   • Windows 98
   • Windows 2000
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows 7

Side effects:
   • Drops files
   • Registry modification

 Files It copies itself to the following location:
   • %APPDATA%\Microsoft\service.exe

 Registry One of the following values is added in order to run the process after reboot:

–  [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "service"="%APPDATA%\Microsoft\service.exe"

 Stealing It tries to steal the following information:
– Recorded passwords used by the AutoComplete function

 Miscellaneous Internet connection:
In order to check for its internet connection the following DNS server is contacted:
   • anon.dyndns.**********

Описание добавил Andrei Ilie в(о) вторник, 22 февраля 2011 г.
Описание обновил Andrei Ilie в(о) пятница, 25 февраля 2011 г.

Назад . . . .