Need help? Ask the community or hire an expert.
Go to Avira Answers
Date discovered:15/06/2010
In the wild:Yes
Reported Infections:Low to medium
Distribution Potential:Low
Damage Potential:Medium
Static file:Yes
File size:106.497 Bytes
MD5 checksum:2f62dbeb5c53122d70f144f66b0d129e
IVDF version:

 General Aliases:
   •  Sophos: Mal/VBInject-D
   •  Bitdefender: Trojan.Generic.4023153
   •  Panda: W32/P2PWorm.MI

Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003

Side effects:
   • Third party control
   • Drops malicious files
   • Registry modification

 Files It copies itself to the following location:
   • %TEMPDIR%\Winlogen.exe

The following file is created:


It tries to executes the following files:

– Filename:
   • "%TEMPDIR%\Winlogen.exe"

– Filename:
   • %TEMPDIR%\Winlogen.exe

 Registry The following registry keys are added in order to run the processes after reboot:

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "Windows Firewall"="%TEMPDIR%\Winlogen.exe"

– [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
   • "Windows Firewall"="%TEMPDIR%\Winlogen.exe"

 IRC To deliver system information and to provide remote control it connects to the following IRC Servers:

Port: 3211
Channel: #sWv2#
Nickname: {NEW}[USA][XP-SP3]%number%

Server: swv2.psy**********.cz
Port: 3211
Channel: #sWv2#
Nickname: {NEW}[USA][XP-SP3]%number%

 File details Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with a runtime packer.

Description inserted by Petre Galan on Wednesday, August 25, 2010
Description updated by Petre Galan on Wednesday, August 25, 2010

Back . . . .