Avira Virus Lab

WORM/Autorun.Agen.152

  • Name
    WORM/Autorun.Agen.152
  • Date discovered
    Oct 1, 2015
  • Type
    Malware
  • Impact
    High 
  • Reported Infections
    Low 
  • Operating System
    Windows
  • VDF version
    7.11.149.112 (2014-05-13 16:17)

Stay safe from all these threats with Avira Free Antivirus.

Avira Free Antivirus Download Free

The term 'WORM' denotes a worm that is able to spread itself, for instance, over the Internet (using email, peer-to-peer networks, or IRC networks, etc.).

  • VDF
    7.11.149.112 (2014-05-13 16:17)
  • Aliases
    Avast: Win32:Malware-gen
    AVG: Agent4.BUNP
    Dr. Web: Trojan.DownLoader11.8575
    Trend Micro: Mal_OtorunP
    Microsoft: Worm:Win32/Goldrv.A
    G Data: Trojan.Ransom.AKI
    Kaspersky Lab: Trojan-Ransom.Win32.Blocker.endf
    Bitdefender: Trojan.Ransom.AKI
    ESET: Win32/Agent.NPN worm
  • Files
    The following copies of itself are created:
    • %APPDATA%\svchost10.exe
    The following files are changed:
    • %temporary internet files%\Content.IE5\index.dat
    • %USERPROFILE%\Cookies\index.dat
    • %USERPROFILE%\Local Settings\History\History.IE5\index.dat
    The following files are created:
    • %USERPROFILE%\Cookies\biluta@en.wikipedia[1].txt
  • Registry
    The following registry entries are added:
    • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run ("WirelessConfig": "%DISKDRIVE%\documents and settings\biluta\application data\svchost10.exe")
    • HKEY_CURRENT_CONFIG\Software\Microsoft\windows\CurrentVersion\Internet Settings ("ProxyEnable": dword:00000000)

Help make the web safer by sending us suspicious files/URLs to analyze

Submit your file/URL or Go to support.avira.com

Why submit a suspicious file?

If you encountered a suspicious file or website that’s not in our database, we’ll analyze it and determine whether it’s harmful. Our findings are then pushed out to our millions of users with their next virus database update. If you have Avira, you’ll get that update too. Don’t have Avira? Get it on our homepage.