Avira Virus Lab

‹ Back

TR/Rogue.5038080

Summary
  • Name
    TR/Rogue.5038080
  • Date discovered
    Oct 1, 2015
  • VDF version
    7.11.186.164 (2014-11-17 11:12)
Description

The term 'TR' denotes a trojan horse that is able to spy out data, violate your privacy, or perform unwanted modifications to the system.

  • VDF
    7.11.186.164 (2014-11-17 11:12)
  • Files
    The following files are renamed:
    • %SYSDIR%\d3d9caps.tmp
    • %DISKDRIVE%\Documents and Settings\All Users\Application Data\Adobe\Reader\9.2\ARM\BIT1.tmp
    The following files are created:
    • %SYSDIR%\d3d9caps.tmp
    The following files are deleted:
    • %SYSDIR%\d3d9caps.dat
    The following files are changed:
    • %DISKDRIVE%\Documents and Settings\All Users\Application Data\Adobe\Reader\9.2\ARM\BIT1.tmp
    • %SYSDIR%\wbem\Logs\wbemcore.log
    • %WINDIR%\Prefetch\WMIADAP.EXE-2DF425B2.pf
    • %WINDIR%\Prefetch\WMIPRVSE.EXE-28F301A9.pf
  • Registry
    The following registry entries are added:
    • HKEY_CURRENT_USER\Software\Microsoft\Direct3D\MostRecentApplication ("Name": "sample.exe")
    • HKEY_CURRENT_USER\Software\Activision\Madagascar\Settings ("DXChecked": dword:00000001)
    • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS ("StateIndex": dword:00000000)
    • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5 ("Blob": %hex values%)
    • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Network\{4D36E972-E325-11CE-BFC1-08002BE10318}\{C752BBCA-6DFD-4ACB-8D4A-13FC676C5D47}\Connection ("PnpInstanceID": "PCI\VEN_1022&DEV_2000&SUBSYS_20001022&REV_10\4&47B7341&0&0088")
    The values of the following registry keys are removed:
    • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates (4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5: -)