Avira 病毒搜尋

TR/Crypt.EPACK.24962

  • 名稱
    TR/Crypt.EPACK.24962
  • 发现日期
    2016年2月25日
  • 類型
    Malware
  • 影響
     
  • 報告的感染
     
  • 作業系統
    Windows
  • VDF 版本
    7.11.98.122 (2013-08-27 21:08)

'TR' 一詞表示特洛伊木馬程式,它能夠偵察資料來侵害您的隱私,或是對系統執行有害的通知。

存心詐騙的用戶或惡意程式碼可以利用此檔案來降低安全性設定。

作業系統:Microsoft Windows。

  • VDF
    7.11.98.122 (2013-08-27 21:08)
  • 別名
    Avast: Win32:Malware-gen
    AVG: FileCryptor.HOO
    Dr. Web: Trojan.Encoder.3976
    Trend Micro: Ransom_LOCKY.E
    Microsoft: Ransom:Win32/Locky.A
    G Data: Trojan.GenericKD.3066022
    Kaspersky Lab: Trojan-Ransom.Win32.Locky.ba
    Bitdefender: Trojan.GenericKD.3066022
    ESET: Win32/Filecoder.Locky.A trojan
  • 檔案
    重新命名下列檔案:
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\excel4.xls
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\excel.xls
    • %USERPROFILE%\Templates\winword2.doc
    • %USERPROFILE%\Templates\powerpnt.ppt
    • %USERPROFILE%\Templates\excel4.xls
    • %USERPROFILE%\Templates\excel.xls
    • %USERPROFILE%\Templates\winword.doc
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\winword2.doc
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\winword.doc
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\powerpnt.ppt
    • %DISKDRIVE%\67edd601553864307ce739a3c57414fe\eula.1040.rtf
    • %DISKDRIVE%\totalcmd\REGISTER.RTF
    • %DISKDRIVE%\67edd601553864307ce739a3c57414fe\eula.1028.rtf
    • %USERPROFILE%\Templates\quattro.wb2
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\quattro.wb2
    • %DISKDRIVE%\67edd601553864307ce739a3c57414fe\eula.1037.rtf
    • %DISKDRIVE%\AUTOEXEC.BAT
    • %temporary internet files%\Content.IE5\QH9ZEEV0\deliver[1].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\dapmsn[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\download[1].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\Q9HNXVQDZNM[1].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\select[1].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\sf.dwnld[2].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\3eh[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\script_300_250[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\adframe[2].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\4a0253de6eac448d8f2c39c53f8926[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\abg[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\render_ads[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\min[2].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\show_ads[2].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\A524879_300_250[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\jquery.outerhtml[2].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\modernizr.custom.90514[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\jquery-1.4.2.min[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\fZnvW9PtDSQ[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\dd_belatedpng[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\ec22e9952c2296e3b17de63cd1bea1f2[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\anatm[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\deliver[1].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\ga[2].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\beacon[1].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\8WhVgFJlDOQ[2].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\bootstrap[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\script_300_250[1].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\en[1].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\jquery-1.5.1[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\jquery[1].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\min[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\show_ads_impl[2].js
    • %USERPROFILE%\Cookies\biluta@www.msn[1].txt
    • %USERPROFILE%\Cookies\[email protected][2].txt
    變更下列檔案:
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\excel4.xls
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\excel.xls
    • %USERPROFILE%\Templates\winword2.doc
    • %USERPROFILE%\Templates\powerpnt.ppt
    • %USERPROFILE%\Templates\excel4.xls
    • %USERPROFILE%\Templates\excel.xls
    • %USERPROFILE%\Templates\winword.doc
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\winword2.doc
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\winword.doc
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\powerpnt.ppt
    • %DISKDRIVE%\67edd601553864307ce739a3c57414fe\eula.1040.rtf
    • %DISKDRIVE%\totalcmd\REGISTER.RTF
    • %DISKDRIVE%\AUTOEXEC.BAT
    • %temporary internet files%\Content.IE5\QH9ZEEV0\deliver[1].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\dapmsn[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\download[1].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\Q9HNXVQDZNM[1].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\select[1].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\sf.dwnld[2].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\3eh[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\script_300_250[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\adframe[2].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\4a0253de6eac448d8f2c39c53f8926[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\abg[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\render_ads[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\min[2].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\show_ads[2].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\A524879_300_250[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\jquery.outerhtml[2].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\modernizr.custom.90514[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\jquery-1.4.2.min[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\fZnvW9PtDSQ[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\dd_belatedpng[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\ec22e9952c2296e3b17de63cd1bea1f2[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\anatm[1].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\deliver[1].js
    • %temporary internet files%\Content.IE5\5KMEPSXE\ga[2].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\beacon[1].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\8WhVgFJlDOQ[2].js
    • %temporary internet files%\Content.IE5\A9SFWXZG\bootstrap[2].js
    • %temporary internet files%\Content.IE5\LV2JIAKP\script_300_250[1].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\en[1].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\jquery-1.5.1[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\jquery[1].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\min[2].js
    • %temporary internet files%\Content.IE5\QH9ZEEV0\show_ads_impl[2].js
    • %USERPROFILE%\Cookies\biluta@www.msn[1].txt
    • %USERPROFILE%\Cookies\[email protected][2].txt
    • %USERPROFILE%\Cookies\biluta@www.bing[1].txt
    • %USERPROFILE%\Cookies\[email protected][2].txt
    • %USERPROFILE%\Cookies\[email protected][1].txt
    • %USERPROFILE%\Cookies\[email protected][1].txt
    建立下列檔案:
    • %DISKDRIVE%\totalcmd\_Locky_recover_instructions.txt
    • %DISKDRIVE%\Documents and Settings\Default User\Templates\_Locky_recover_instructions.txt
    • %USERPROFILE%\Templates\_Locky_recover_instructions.txt
    • %DISKDRIVE%\67edd601553864307ce739a3c57414fe\_Locky_recover_instructions.txt
    • %DISKDRIVE%\_Locky_recover_instructions.txt
    • %temporary internet files%\Content.IE5\QH9ZEEV0\_Locky_recover_instructions.txt
    • %temporary internet files%\Content.IE5\LV2JIAKP\_Locky_recover_instructions.txt
    • %temporary internet files%\Content.IE5\5KMEPSXE\_Locky_recover_instructions.txt
    • %temporary internet files%\Content.IE5\A9SFWXZG\_Locky_recover_instructions.txt
    • %USERPROFILE%\Cookies\_Locky_recover_instructions.txt
  • 登錄
    新增下列登錄授權碼:
    • [HKEY_CURRENT_USER\Software\Locky] "id" = "74203292F1D3897A" "pubkey" = %hex values% "paytext" = %hex values%
  • HTTP 請求
    • 91.*****.97.170/main.php

將可疑的檔案/URL 送予我們分析,助力構建更安全的網站。

送出您的檔案/URL 或者 請前往 Avira 問答區

為何送出可疑的檔案?

如果您遇到不在我們資料庫中的可疑檔案或網站,我們會對其進行分析,確定其是否有害。我們的分析結果將向數百萬名用戶公開,並納入下一次病毒資料庫更新。如果您擁有 Avira,您也將取得此更新。尚未擁有 Avira?請前往 我們的首頁獲取。

何為 Avira 問答區?

Avira 問答區是我們大力發展的社區,由專業技術人員和兼職專家並肩合作,幫助解決技術問題。這一 Avira 用戶社區是您提出問題的絕佳場所。