Need help? Ask the community or hire an expert.
Go to Avira Answers
Date discovered:09/12/2010
In the wild:No
Reported Infections:Low
Distribution Potential:Low to medium
Damage Potential:Low
File size:258560 Bytes
MD5 checksum:dfe23ad3d50c1cf45ff222842c7551ae
VDF version:
IVDF version: - Thursday, December 9, 2010

 General Method of propagation:
   • No own spreading routine

   •  Kaspersky: Trojan.Win32.Bublik.iez
   •  Eset: a variant of Win32/Injector.XHP trojan
     DrWeb: Trojan.Packed.23284

Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
    Windows Vista
    Windows Server 2008
    Windows 7

Side effects:
   • Registry modification

 Files It copies itself to the following location:
   • %SYSDIR%\wmpsl64.exe

 Registry One of the following values is added in order to run the process after reboot:

   • "Windows Media Scheduler"="c:\windows\\system32\\wmpsl64.exe"

The following registry keys are added in order to load the services after reboot:

   • "c:\windows\\system32\\wmpsl64.exe"="c:\windows\\system32\\wmpsl64.exe:*:Enabled:Windows Media Scheduler"

   • "c:\windows\\system32\\wmpsl64.exe"="c:\windows\\system32\\wmpsl64.exe:*:Enabled:Windows Media Scheduler"

 Miscellaneous Event handler:
It creates the following Event handlers:
   • WriteProcessMemory
   • CreateRemoteThread
   • createProcess
   • CreateFile
   • GetDriveType

Furthermore it contains the following strings:
   • JOIN
   • NICK
   • PASS
   • USER

Açıklamayı yerleştiren Wensin Lee tarihinde 4 Ekim 2012 Perşembe
Açıklamayı güncelleyen: Wensin Lee tarihinde 4 Ekim 2012 Perşembe

Geri . . . .
https:// Bu pencere güvenlik amacıyla şifrelenmiştir.