Avira Virus Lab


  • Name
  • Date discovered
    Feb 25, 2016
  • Type
  • Impact
  • Reported Infections
  • Operating System
  • VDF version (2016-01-17 08:39)

Stay safe from all these threats with Avira Free Antivirus.

Avira Free Antivirus Download Free

The term 'TR' denotes a trojan horse that is able to spy out data, violate your privacy, or perform unwanted modifications to the system.

The file can be used by rogue users or malware to lower security settings.

Operating System: Microsoft Windows.

  • VDF (2016-01-17 08:39)
  • Aliases
    Avast: Win32:Malware-gen
    AVG: Crypt5.AKFL
    Dr. Web: Trojan.Encoder.4001
    Microsoft: Trojan:Win32/Dynamer!ac
    G Data: Trojan.GenericKD.3059311
    Kaspersky Lab: Worm.Win32.Ngrbot.azbb
    Bitdefender: Trojan.GenericKD.3059311
    ESET: Win32/Kryptik.EOSM trojan
  • Files
    The following copies of itself are created:
    • %APPDATA%\WindowsUpdate\Updater.exe
    • %APPDATA%\Update\Explorer.exe
    • %APPDATA%\c731200
    • %APPDATA%\Update\Update.exe
    • %APPDATA%\Microsoft\Windows\Themes\Elocog.exe
    The following files are renamed:
    The following files are deleted:
    • %DISKDRIVE%\pqvwdmcrf\S-1-5-21-602162358-879983540-682003330-1003\desktop.ini
    • %DISKDRIVE%\pqvwdmcrf\S-1-5-21-602162358-879983540-682003330-1003\INFO2
    • %DISKDRIVE%\pqvwdmcrf\S-1-5-21-602162358-879983540-682003330-1003
    • %DISKDRIVE%\pqvwdmcrf
    The following files are created:
    • %TEMPDIR%\c731200
  • Injections
    • %all running processes%
  • Registry
    The following registry entries are added:
    • [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run] "Windows Update Installer" = "%APPDATA%\WindowsUpdate\Updater.exe"
    • [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] "Taskman" = "%APPDATA%\WindowsUpdate\Updater.exe"
    • [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run] "Elocog" = "%APPDATA%\Microsoft\Windows\themes\Elocog.exe"
    The following registry entries are changed:
    • [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] FileZilla Server Interface = - VMware User Process = - Adobe ARM = - VMware Tools = - SunJavaUpdateSched = - Adobe Reader Speed Launcher = -
  • HTTP Requests
    • api.*****nia.com/

Help make the web safer by sending us suspicious files/URLs to analyze

Submit your file/URL or Go to support.avira.com

Why submit a suspicious file?

If you encountered a suspicious file or website that’s not in our database, we’ll analyze it and determine whether it’s harmful. Our findings are then pushed out to our millions of users with their next virus database update. If you have Avira, you’ll get that update too. Don’t have Avira? Get it on our homepage.