Need help? Ask the community or hire an expert.
Go to Avira Answers
Date discovered:28/09/2010
In the wild:Yes
Reported Infections:Low to medium
Distribution Potential:Medium
Damage Potential:Medium
Static file:Yes
File size:58.880 Bytes
MD5 checksum:bd8282316060c2ee4bb64b7cab986aae
VDF version:
IVDF version:

 General Methods of propagation:
   • Autorun feature
   • Messenger

   •  Bitdefender: Trojan.Generic.KDV.43997
   •  Panda: Trj/Injector.AQ
   •  Eset: Win32/Yimfoca.AA

Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003

Side effects:
   • Third party control
   • Drops malicious files
   • Lowers security settings
   • Registry modification

 Files It copies itself to the following locations:
   • %WINDIR%\nvsvc32.exb
   • %WINDIR%\nvsvc32.exe
   • %drive%\nvsvc32.exe

It deletes the initially executed copy of itself.

The following files are created:

%drive%\autorun.inf This is a non malicious text file with the following content:
   • %code that runs malware%


It tries to execute the following files:

– Filename:
   • net stop

– Filename:
   • net1 stop MsMpSvc

– Filename:
   • net1 stop

– Filename:
   • netsh firewall add allowedprogram 1.exe 1 ENABLE

– Filename:
   • %WINDIR%\nvsvc32.exe

– Filename:
   • explorer.exe

– Filename:
   • net stop wuauserv

– Filename:
   • net stop MsMpSvc

– Filename:
   • sc config wuauserv start= disabled

– Filename:
   • sc config MsMpSvc start= disabled

– Filename:
   • net1 stop wuauserv

 Registry The following registry keys are added in order to run the processes after reboot:

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "NVIDIA driver monitor"="%WINDIR%\nvsvc32.exe"

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Terminal Server\
   • "NVIDIA driver monitor"="%WINDIR%\nvsvc32.exe"

– [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
   • "NVIDIA driver monitor"="%WINDIR%\nvsvc32.exe"

It creates the following entry in order to bypass the Windows XP firewall:

– [HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\
   • "%executed file%"="%WINDIR%\nvsvc32.exe:*:Enabled:NVIDIA driver

 Messenger It is spreading via Messenger. The characteristics are described below:

– Windows Messenger
– Yahoo Messenger

Propagation via URL

The URL then refers to a copy of the described malware. If the user downloads and executes this file the infection process will start again.

 IRC To deliver system information and to provide remote control it connects to the following IRC Server:

Server: 205.234.14**********.207
Port: 1234
Channel: #nn#
Nickname: NEW-[USA|00|P|%number%]

 Miscellaneous Accesses internet resources:

It creates the following Mutex:
   • Nvidia Drive Mon

 File details Programming language:
The malware program was written in MS Visual C++.

Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with a runtime packer.

Description inserted by Petre Galan on Tuesday, March 8, 2011
Description updated by Petre Galan on Tuesday, March 8, 2011

Back . . . .