La mia libreria
La mia libreria

+ Aggiungi alla libreria

Supporto
Supporto 24/7 | Regole per contattare

Richieste

Profile

Trojan.Inject.63354

Aggiunto al database dei virus Dr.Web: 2012-02-09

La descrizione è stata aggiunta:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'googletalk' = '%APPDATA%\Google Talk\googletalk.exe /autostart'
Malicious functions:
Creates and executes the following:
  • %TEMP%\8414.exe
  • %TEMP%\6119.exe
Executes the following:
  • <SYSTEM32>\systeminfo.exe
Modifies file system :
Creates the following files:
  • %TEMP%\8414.exe
  • %TEMP%\bm3.tmp
  • %APPDATA%\Google Talk\googletalk.exe
  • %TEMP%\nsz2.tmp
  • %TEMP%\6119.exe
  • %APPDATA%\Microsoft\Sze\hqhmp
Deletes the following files:
  • %TEMP%\6119.exe
Miscellaneous:
Searches for the following windows:
  • ClassName: 'STATUS_PLUGPLAYED NO SIGNMENT_UND' WindowName: '%s\V34EcFeConsidualQueueStreamHeap creamTx-Rx Proc'
  • ClassName: 'STATUS_NOTIFY_TIMER_CALC_ADDBA' WindowName: 'Amos::dpSessage formDisable 0x%X ==> Statellation ( 1Sect'
  • ClassName: 'Amos::dpSessage formDisable 0x%X ==> Statellation ( 1Sect' WindowName: 'STATUS_CARD_LINKQ -> shout '
  • ClassName: 'STATUS_PLUGPLAYED NO SIGNMENT_UND' WindowName: 'Amos::dpSessage formDisable 0x%X ==> Statellation ( 1Sect'
  • ClassName: 'BCS_EV_MMAC_OID_SISO_40M - IoGetSysted valid number size %d ' WindowName: 'BCS_EV_MMAC_OID_SISO_40M - IoGetSysted valid number size %d '
  • ClassName: 'EV_MMAC_OID_DRIVILE' WindowName: 'STATUS_CARD_LINKQ -> shout '
  • ClassName: 'BCS_EV_MMAC_OID_SISO_40M - IoGetSysted valid number size %d ' WindowName: 'Dired/Start Array'
  • ClassName: 'A diff xx ' WindowName: 'A diff xx '
  • ClassName: 'Amos::dpSessage formDisable 0x%X ==> Statellation ( 1Sect' WindowName: 'IfCmd: mints'
  • ClassName: 'm_SymAgcContainUpString' WindowName: 'CSamplesInstabase'
  • ClassName: 'Error: buffer inished Uninstation Sparam: ' WindowName: 'Error: buffer inished Uninstation Sparam: '
  • ClassName: 'Indicator' WindowName: ''
  • ClassName: 'dxg.pdb' WindowName: 'Mic cho Gain recoding actionNameteric VPD'
  • ClassName: 'm_SymAgcContainUpString' WindowName: 'm_SymAgcContainUpString'
  • ClassName: 'STATUS_CARD_LINKQ -> shout ' WindowName: 'EV_HMAC_OID_VOLUME'
  • ClassName: 'Amos::dpSessage formDisable 0x%X ==> Statellation ( 1Sect' WindowName: 'Applify '
  • ClassName: 'SkBuf' WindowName: 'EV_MMAC_OID_802_11_POLICATED '
  • ClassName: '%s\V34EcFeConsidualQueueStreamHeap creamTx-Rx Proc' WindowName: 'Error: buffer inished Uninstation Sparam: '
  • ClassName: 'dxg.pdb' WindowName: '%s\V34EcFeConsidualQueueStreamHeap creamTx-Rx Proc'
  • ClassName: 'EV_MMAC_OID_802_11_POLICATED ' WindowName: 'EV_MMAC_OID_802_11_POLICATED '
  • ClassName: 'Final) = -%d.%d control->Control inderPath}\{Uninstack' WindowName: 'CFG_ADDRESUMI CDDED '
  • ClassName: 'BCS_EV_MMAC_OID_SISO_40M - IoGetSysted valid number size %d ' WindowName: 'EV_MMAC_OID_802_11_POLICATED '
  • ClassName: 'IfCmd: mints' WindowName: 'BCS_EV_MMAC_OID_SISO_40M - IoGetSysted valid number size %d '
  • ClassName: 'CSamplesInstabase' WindowName: 'Amos::dpSessage formDisable 0x%X ==> Statellation ( 1Sect'
  • ClassName: 'Shell_TrayWnd' WindowName: ''
  • ClassName: 'GetStdHanginning Just filed' WindowName: 'IfCmd: mints'
  • ClassName: 'Amos::dpSessage formDisable 0x%X ==> Statellation ( 1Sect' WindowName: 'Delay NameternetworksampleObjectivate = %f DFE Over size %d in in %f '
  • ClassName: 'Amos::dpSessage formDisable 0x%X ==> Statellation ( 1Sect' WindowName: 'Amos::dpSessage formDisable 0x%X ==> Statellation ( 1Sect'
  • ClassName: 'STATUS_PLUGPLAYED NO SIGNMENT_UND' WindowName: 'CSamplesInstabase'
  • ClassName: 'STATUS_PLUGPLAYED NO SIGNMENT_UND' WindowName: 'STATUS_PLUGPLAYED NO SIGNMENT_UND'
  • ClassName: 'CFG_ADDRESUMI CDDED ' WindowName: 'Disk help!'
  • ClassName: 'CSamplesInstabase' WindowName: 'T: %m '
  • ClassName: 'Mic cho Gain recoding actionNameteric VPD' WindowName: 'Mic cho Gain recoding actionNameteric VPD'
  • ClassName: 'IN PROCESS_INVALID_S_SELEC Final' WindowName: 'IN PROCESS_INVALID_S_SELEC Final'
  • ClassName: 'STATUS_PLUGPLAYED NO SIGNMENT_UND' WindowName: 'START_ASSOCIATE'
  • ClassName: 'Disk help!' WindowName: 'Disk help!'
  • ClassName: 'Deactivate=%s kflag %s.INFOmh %d' WindowName: 'Deactivate=%s kflag %s.INFOmh %d'
  • ClassName: '%s\VirtupDiGetExter conflic again to Reg NormallEvent %d' WindowName: '?Location Mutes'
  • ClassName: 'm_AllocateEven definitorativer' WindowName: 'nwdware not ack '
  • ClassName: '?Location Mutes' WindowName: 'STATUS_LPC_NO_CCX_STATUS_NOT_MAKE'
  • ClassName: 'EV_MMAC_NT_MAX_LIST ' WindowName: '?Location Mutes'
  • ClassName: 'Sr %s nvu ' WindowName: 'EV_HMAC_RX_STOP_DETERNED'
  • ClassName: 'Line, %d' WindowName: 'Found klog: disabled'
  • ClassName: '?Location Mutes' WindowName: 'EV_MMAC_OID_SV_PMODE'
  • ClassName: '?Location Mutes' WindowName: '20000-255|0,1,2,3,4,5,6,7,8,9,A,B,C,D,*,#,!|0-65534'
  • ClassName: 'Findows INITIALID_NAME_NOT_DEBUGGER_MEMBERSION_COMMIT_JOB' WindowName: 'Deactivate=%s kflag %s.INFOmh %d'
  • ClassName: 'ROAM_EVENT_SSID ' WindowName: 'EV_HMAC_RX_STOP_DETERNED'
  • ClassName: 'MSG_GETCARD_INVALID' WindowName: 'Found klog: disabled'
  • ClassName: 'dpDeacher %d ' WindowName: 'EV_MMAC_OID_SV_PMODE'
  • ClassName: 'STATUS_LPC_NO_CCX_STATUS_NOT_MAKE' WindowName: '_X_V32/Call bit failength up %d '
  • ClassName: 'VESA DMT ' WindowName: 'nwdware not ack '
  • ClassName: 'Sd dBm])' WindowName: 'nwdware not ack '
  • ClassName: '?Location Mutes' WindowName: '?Location Mutes'
  • ClassName: 'ROAM_EVENT_SSID ' WindowName: 'ROAM_EVENT_SSID '
  • ClassName: 'Device::Acquision' WindowName: 'Line, %d'
  • ClassName: 'SkBuffer conse' WindowName: '?Location Mutes'
  • ClassName: '%s\VirtupDiGetExter conflic again to Reg NormallEvent %d' WindowName: '%s\VirtupDiGetExter conflic again to Reg NormallEvent %d'
  • ClassName: 'Findows INITIALID_NAME_NOT_DEBUGGER_MEMBERSION_COMMIT_JOB' WindowName: 'STATUS_INTERSION'
  • ClassName: 'EV_HMAC_MMAC_OID_TX_PWR_Configuration for it 21 %x' WindowName: 'm_AllocateEven definitorativer'
  • ClassName: 'm_AllocateEven definitorativer' WindowName: '%s\VirtupDiGetExter conflic again to Reg NormallEvent %d'
  • ClassName: 'SkBuffer conse' WindowName: 'PhaseReneg Name disks'
  • ClassName: '?Location Mutes' WindowName: 'EV_HMAC_MMAC_OID_TX_PWR_Configuration for it 21 %x'
  • ClassName: 'EV_HMAC_RX_STOP_DETERNED' WindowName: '_X_V32/Call bit failength up %d '
  • ClassName: 'CSamplicy is thingstor of SSD' WindowName: 'CSamplicy is thingstor of SSD'
  • ClassName: 'EV_HMAC_RESP' WindowName: 'Sr %s nvu '
  • ClassName: 'PhaseReneg Name disks' WindowName: 'EV_MMAC_OID_SV_PMODE'
  • ClassName: 'Findows INITIALID_NAME_NOT_DEBUGGER_MEMBERSION_COMMIT_JOB' WindowName: '0Unknow Call'
  • ClassName: 'Deactivate=%s kflag %s.INFOmh %d' WindowName: 'Sr %s nvu '
  • ClassName: 'EV_HMAC_RESP' WindowName: 'Sd dBm])'
  • ClassName: 'Line, %d' WindowName: 'Deactivate=%s kflag %s.INFOmh %d'
  • ClassName: '?Location Mutes' WindowName: 'PhaseReneg Name disks'
  • ClassName: 'SkBuffer conse' WindowName: 'SkBuffer conse'

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android