Precisa de ajuda? Peça à comunidade ou contrate um perito.
Acesse a Avira Answers
Date discovered:21/05/2013
In the wild:No
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Low
File size:91136 Bytes
MD5 checksum:8eaa608f72736b4d2428a7bb827457bf
VDF version:
IVDF version:

 General Method of propagation:
   • No own spreading routine

   •  Sophos: Troj/Agent-ABXB
   •  Bitdefender: Trojan.GenericKDV.1004460
   •  AVG: Crypt.CCQS
   •  Eset: Win32/Gapz.E trojan

Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows Server 2008
   • Windows 7

Side effects:
   • Registry modification

 Files It copies itself to the following location:
   • %ALLUSERSPROFILE%\Application Data\%random%.exe

 Registry The following registry key is continuously in an infinite loop added in order to run the process after reboot.

–  [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "%random%"=""%ALLUSERSPROFILE%\Application Data\%random%.exe""

The following registry keys are added in order to load the service after reboot:

– [HKCU\Software\fddbbbaddbddsacfsfdsf]
   • "%random%"=""%ALLUSERSPROFILE%\Application Data\%random%.exe""

 Miscellaneous  Checks for an internet connection by contacting the following web site:
   • r.giga**********

Furthermore it contains the following strings:
   • With coming\coolerautumn weathermost\birds[4999].exe
   • smtp://vario**********.nf/
   • http://post**********.es//pull

Descrição enviada por Wensin Lee em quinta-feira, 23 de maio de 2013
Descrição atualizada por Wensin Lee em quinta-feira, 23 de maio de 2013

Voltar . . . .