Нужен совет? Обратитесь за помощью к сообществу или специалистам.
Перейти к Avira Answers
Date discovered:21/08/2013
In the wild:No
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Low
VDF version:
IVDF version:

 General Method of propagation:
   • No own spreading routine

   •  Kaspersky: HEUR:Worm.Script.Generic
   •  TrendMicro: VBS_DUNIHI.AG
   •  Sophos: Mal/VBSlog-A
   •  Bitdefender: Trojan.VBS.Autorun.ADQ
   •  Microsoft: Unknown threat
   •  Eset: VBS/Agent.NDE.worm
   •  GData: Trojan.VBS.Autorun.ADQ

Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows Server 2008
   • Windows 7

Side effects:
   • Can be used to execute malicious code
   • Can be used to modify system settings that allow or augment potential malware behaviour.

 Files It copies itself to the following location:
   • C:\Documents and Settings\Administrator\Start Menu\Programs\Startup\sample.vbs

 Miscellaneous Internet connection:
In order to check for its internet connection the following DNS server is contacted:
   • paltalk.serve**********.com

 File details Programming language:
The malware program was written in Visual Basic.

Описание добавил Wensin Lee в(о) пятница, 23 августа 2013 г.
Описание обновил Wensin Lee в(о) пятница, 23 августа 2013 г.

Назад . . . .