Backdoor.Win32.Fynloski_ba9bb47e1a

by malwarelabrobot on July 27th, 2013 in Malware Descriptions.

Trojan.Win32.Jorik.DarkKomet.ba (Kaspersky), Backdoor.Win32.Fynloski.FD, Trojan.Win32.Iconomon.FD, Trojan.Win32.Sasfis.FD, VirTool.Win32.DelfInject.FD, GenericInjector.YR, BackdoorFynloski.YR, GenericDownloader.YR, TrojanDownloaderAndromeda.YR (Lavasoft MAS)
Behaviour: Trojan-Downloader, Trojan, Backdoor, VirTool


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Summary
Technical Details
Removal Recommendations

MD5: ba9bb47e1a3f5a8f287c477cb9136af1
SHA1: 766325fd85ed28018320f2506319f789ff44c9d1
SHA256: 4f5212b7306316b1752c069dd958c87fbec533bb7ad3af02c7ba78ec37b080b5
SSDeep: 6144:VMbUP17dlNfTuXuACK0CjCKwkXxH6FNz/RJU49TEnvF5Eayt33WJ:VcUP1plgl0 CKfXMj/QCwnvF53
Size: 323584 bytes
File type: PE32
Platform: WIN32
Entropy: Packed
PEID: MicrosoftVisualC; UPolyXv05_v6; NETexecutable
Company: no certificate found
Created at: 2013-07-24 07:50:41


Summary:

Backdoor. Malware that enables a remote control of victim's machine.

Payload

No specific payload has been found.

Process activity

The Backdoor creates the following process(es):

ba9bb47e1a3f5a8f287c477cb9136af1.exe:1396
AppLaunch.exe:620
AppLaunch.exe:212
AppLaunch.exe:1340
AppLaunch.exe:196
AppLaunch.exe:1124
AppLaunch.exe:584
AppLaunch.exe:1160
AppLaunch.exe:1900
AppLaunch.exe:1632
AppLaunch.exe:1772
AppLaunch.exe:1852
AppLaunch.exe:1192
AppLaunch.exe:1692
AppLaunch.exe:1376
AppLaunch.exe:476
AppLaunch.exe:1508
AppLaunch.exe:1752
AppLaunch.exe:892
AppLaunch.exe:628
AppLaunch.exe:1168
AppLaunch.exe:1956
AppLaunch.exe:1804
AppLaunch.exe:844
AppLaunch.exe:1704
AppLaunch.exe:2216
AppLaunch.exe:1188
AppLaunch.exe:1800
AppLaunch.exe:1724
AppLaunch.exe:2272
AppLaunch.exe:2148
wbemcore.exe:1336

The Backdoor injects its code into the following process(es):

SyncHost.exe:1176
AppLaunch.exe:2020
wbemcore.exe:1736

File activity

The process SyncHost.exe:1176 makes changes in a file system.
The Backdoor deletes the following file(s):

%Documents and Settings%\%current user%\Application Data\Microsoft\Windows\SyncHost.exe (0 bytes)

The process ba9bb47e1a3f5a8f287c477cb9136af1.exe:1396 makes changes in a file system.
The Backdoor creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Application Data\Microsoft\Windows\wbemcore.exe (10 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\Windows\SyncHost.exe (1425 bytes)

Registry activity

The process SyncHost.exe:1176 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "DB C5 E1 D1 4E E7 E4 3B 91 14 CB F3 DA 78 03 F8"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"

The Backdoor modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"

The Backdoor modifies IE settings for security zones to map all urls to the Intranet Zone:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"

The Backdoor modifies IE settings for security zones to map all web-nodes that bypassing proxy to the Intranet Zone:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass" = "1"

The process ba9bb47e1a3f5a8f287c477cb9136af1.exe:1396 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C7 0D A4 D3 2A 14 40 28 7C 3F 6B 7B 7B 60 FE 44"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"

[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%Documents and Settings%\%current user%\Application Data\Microsoft\Windows]
"wbemcore.exe" = "Windows Management Instrumentation"

The Backdoor modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"

The Backdoor modifies IE settings for security zones to map all urls to the Intranet Zone:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"

The Backdoor modifies IE settings for security zones to map all web-nodes that bypassing proxy to the Intranet Zone:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass" = "1"

The process AppLaunch.exe:620 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D9 7E 64 BF BA 34 2F 2E 81 31 C3 FA 44 72 DF 31"

[HKCU\Software\DC3_FEXEC]
"7/26/2013 at 11:33:10 PM" = "{118c04c0-7454-11e2-81a8-806d6172696f-2829482533}"

The process AppLaunch.exe:212 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F2 3F ED 47 8C 67 AB 76 9F 88 86 C9 EF D7 3D F6"

[HKCU\Software\DC3_FEXEC]
"7/26/2013 at 11:33:03 PM" = "{118c04c0-7454-11e2-81a8-806d6172696f-2829482533}"

The process AppLaunch.exe:1340 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "21 E5 AC 31 E0 C0 89 AF E8 1C 31 D9 0E 80 9A 13"

[HKCU\Software\DC3_FEXEC]
"7/26/2013 at 11:32:43 PM" = "{118c04c0-7454-11e2-81a8-806d6172696f-2829482533}"

The process AppLaunch.exe:196 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B8 1C B6 9F EA F8 52 7D 91 FD 77 3C 41 E5 CD 1E"

[HKCU\Software\DC3_FEXEC]
"7/26/2013 at 11:32:25 PM" = "{118c04c0-7454-11e2-81a8-806d6172696f-2829482533}"

The process AppLaunch.exe:1124 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1D 93 69 38 40 A2 B0 D7 3D C5 86 76 A8 5F 78 C5"

[HKCU\Software\DC3_FEXEC]
"7/26/2013 at 11:32:56 PM" = "{118c04c0-7454-11e2-81a8-806d6172696f-2829482533}"

The process AppLaunch.exe:584 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A2 27 9D F2 88 E2 CE FD 88 E1 05 9A E6 33 D8 F1"

[HKCU\Software\DC3_FEXEC]
"7/26/2013 at 11:32:48 PM" = "{118c04c0-7454-11e2-81a8-806d6172696f-2829482533}"

The process AppLaunch.exe:1160 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CA 91 77 C7 3F 2B 9C 00 7D 25 22 AE 76 0F D2 4D"

[HKCU\Software\DC3_FEXEC]
"7/26/2013 at 11:33:00 PM" = "{118c04c0-7454-11e2-81a8-806d6172696f-2829482533}"

The process AppLaunch.exe:1900 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "DB 2C C3 18 6C 7B B9 95 73 3D 82 AB AB 66 AF 29"

[HKCU\Software\DC3_FEXEC]
"7/26/2013 at 11:32:36 PM" = "{118c04c0-7454-11e2-81a8-806d6172696f-2829482533}"

The process AppLaunch.exe:1632 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "43 B2 2A 23 F7 3E E6 62 84 93 57 8C 71 49 EA 55"

[HKCU\Software\DC3_FEXEC]
"7/26/2013 at 11:33:23 PM" = "{118c04c0-7454-11e2-81a8-806d6172696f-2829482533}"

The process AppLaunch.exe:1772 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "AB B3 2A F2 27 D9 FC 29 E2 EC CD 73 46 52 DD F0"

[HKCU\Software\DC3_FEXEC]
"7/26/2013 at 11:32:28 PM" = "{118c04c0-7454-11e2-81a8-806d6172696f-2829482533}"

The process AppLaunch.exe:1852 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F9 EC 4C 0D 3D 7D B5 56 BE 69 F7 01 B3 65 17 75"

[HKCU\Software\DC3_FEXEC]
"7/26/2013 at 11:33:06 PM" = "{118c04c0-7454-11e2-81a8-806d6172696f-2829482533}"

The process AppLaunch.exe:1192 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "65 86 80 AD 3E E7 DD 62 0D 5C 83 61 1E 84 E5 D2"

[HKCU\Software\DC3_FEXEC]
"7/26/2013 at 11:33:18 PM" = "{118c04c0-7454-11e2-81a8-806d6172696f-2829482533}"

The process AppLaunch.exe:1692 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EB 4E 2C 3D 05 A4 6F 32 5C D1 7B 2C 9A A5 EE E5"

[HKCU\Software\DC3_FEXEC]
"7/26/2013 at 11:32:45 PM" = "{118c04c0-7454-11e2-81a8-806d6172696f-2829482533}"

The process AppLaunch.exe:1376 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EE 75 48 91 72 76 85 67 7C 4D DE E7 BD 8A D8 5C"

[HKCU\Software\DC3_FEXEC]
"7/26/2013 at 11:33:26 PM" = "{118c04c0-7454-11e2-81a8-806d6172696f-2829482533}"

The process AppLaunch.exe:476 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "DF 48 95 4A FE 70 9D 0B 06 9B 9B 79 8F B6 C0 A3"

[HKCU\Software\DC3_FEXEC]
"7/26/2013 at 11:33:21 PM" = "{118c04c0-7454-11e2-81a8-806d6172696f-2829482533}"

The process AppLaunch.exe:1508 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "12 CC EB F4 F8 0E 5F E4 22 A4 0F 34 B7 B8 82 BB"

[HKCU\Software\DC3_FEXEC]
"7/26/2013 at 11:32:33 PM" = "{118c04c0-7454-11e2-81a8-806d6172696f-2829482533}"

The process AppLaunch.exe:1752 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CF CD 7A A2 1C 1B 8C 55 77 B1 DE 23 D9 6E 49 B0"

[HKCU\Software\DC3_FEXEC]
"7/26/2013 at 11:33:13 PM" = "{118c04c0-7454-11e2-81a8-806d6172696f-2829482533}"

The process AppLaunch.exe:892 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "05 DE E9 18 4F F7 85 D1 9C 4F 8E 23 43 31 62 1E"

[HKCU\Software\DC3_FEXEC]
"7/26/2013 at 11:32:38 PM" = "{118c04c0-7454-11e2-81a8-806d6172696f-2829482533}"

The process AppLaunch.exe:628 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8A 4D 2D 4E E4 DB 7E 0F F0 CD 06 F7 53 13 C1 4C"

[HKCU\Software\DC3_FEXEC]
"7/26/2013 at 11:32:53 PM" = "{118c04c0-7454-11e2-81a8-806d6172696f-2829482533}"

The process AppLaunch.exe:1168 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "36 5E 91 CB 5F 33 52 9D 36 A7 9F 31 21 AC 29 91"

[HKCU\Software\DC3_FEXEC]
"7/26/2013 at 11:32:20 PM" = "{118c04c0-7454-11e2-81a8-806d6172696f-2829482533}"

The process AppLaunch.exe:1956 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5D 04 C0 F5 53 01 1E C8 A1 5A 98 B4 8F 67 D0 DF"

[HKCU\Software\DC3_FEXEC]
"7/26/2013 at 11:32:58 PM" = "{118c04c0-7454-11e2-81a8-806d6172696f-2829482533}"

The process AppLaunch.exe:1804 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6D 14 CA 84 BB E1 FA 66 70 BE 28 CF 4A 77 A0 3C"

[HKCU\Software\DC3_FEXEC]
"7/26/2013 at 11:33:15 PM" = "{118c04c0-7454-11e2-81a8-806d6172696f-2829482533}"

The process AppLaunch.exe:844 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B9 CD 58 F8 FB F9 9F 6F 63 AB B8 D2 3A 23 65 4A"

[HKCU\Software\DC3_FEXEC]
"7/26/2013 at 11:32:31 PM" = "{118c04c0-7454-11e2-81a8-806d6172696f-2829482533}"

The process AppLaunch.exe:1704 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6A 86 96 FA D9 DB 97 0F AA FF C2 02 D1 CB 04 5C"

[HKCU\Software\DC3_FEXEC]
"7/26/2013 at 11:32:41 PM" = "{118c04c0-7454-11e2-81a8-806d6172696f-2829482533}"

The process AppLaunch.exe:2216 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "7D C2 0D 2E F6 79 FD 77 09 92 1C AB 8D 88 E1 E7"

[HKCU\Software\DC3_FEXEC]
"7/26/2013 at 11:33:31 PM" = "{118c04c0-7454-11e2-81a8-806d6172696f-2829482533}"

The process AppLaunch.exe:1188 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "72 71 C6 71 DF FA 94 45 93 F2 D2 6B B9 94 C3 46"

[HKCU\Software\DC3_FEXEC]
"7/26/2013 at 11:33:08 PM" = "{118c04c0-7454-11e2-81a8-806d6172696f-2829482533}"

The process AppLaunch.exe:1800 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8E F7 6A EA 49 C8 45 A7 E4 2E 71 31 D8 2D CB 8E"

[HKCU\Software\DC3_FEXEC]
"7/26/2013 at 11:32:23 PM" = "{118c04c0-7454-11e2-81a8-806d6172696f-2829482533}"

The process AppLaunch.exe:1724 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "66 70 25 E8 96 82 78 EC 01 DF 4D 34 FA 07 A4 8D"

[HKCU\Software\DC3_FEXEC]
"7/26/2013 at 11:32:50 PM" = "{118c04c0-7454-11e2-81a8-806d6172696f-2829482533}"

The process AppLaunch.exe:2272 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C4 FE 0B 04 90 59 2C 87 09 27 B3 20 9A 35 6B 2A"

[HKCU\Software\DC3_FEXEC]
"7/26/2013 at 11:33:34 PM" = "{118c04c0-7454-11e2-81a8-806d6172696f-2829482533}"

The process AppLaunch.exe:2020 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "24 B8 05 7E 78 5F DF CE 11 78 3D A4 2A 09 8B 18"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

The process AppLaunch.exe:2148 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "93 E4 2F 7A 27 5B 12 76 61 3E 20 6A CA FF E8 1C"

[HKCU\Software\DC3_FEXEC]
"7/26/2013 at 11:33:28 PM" = "{118c04c0-7454-11e2-81a8-806d6172696f-2829482533}"

The process wbemcore.exe:1336 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "90 BF F4 29 D7 8F 22 FD 79 63 42 0E FD 0A 5E 72"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"

To automatically run itself each time Windows is booted, the Backdoor adds the following link to its file to the system registry autorun key:

[HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"Windows Management Instrumentation" = "%Documents and Settings%\%current user%\Application Data\Microsoft\Windows\wbemcore.exe"

The process wbemcore.exe:1736 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D2 AA 9B 03 1C 5E 11 30 72 BF C7 D9 75 1F 1F 42"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"

To automatically run itself each time Windows is booted, the Backdoor adds the following link to its file to the system registry autorun key:

[HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"Windows Management Instrumentation" = "%Documents and Settings%\%current user%\Application Data\Microsoft\Windows\wbemcore.exe"

Network activity (URLs)

URL IP
jazibaba.no-ip.org 67.215.4.123


Rootkit activity

No anomalies have been detected.

Propagation


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Terminate malicious process(es) (How to End a Process With the Task Manager):

    ba9bb47e1a3f5a8f287c477cb9136af1.exe:1396
    AppLaunch.exe:620
    AppLaunch.exe:212
    AppLaunch.exe:1340
    AppLaunch.exe:196
    AppLaunch.exe:1124
    AppLaunch.exe:584
    AppLaunch.exe:1160
    AppLaunch.exe:1900
    AppLaunch.exe:1632
    AppLaunch.exe:1772
    AppLaunch.exe:1852
    AppLaunch.exe:1192
    AppLaunch.exe:1692
    AppLaunch.exe:1376
    AppLaunch.exe:476
    AppLaunch.exe:1508
    AppLaunch.exe:1752
    AppLaunch.exe:892
    AppLaunch.exe:628
    AppLaunch.exe:1168
    AppLaunch.exe:1956
    AppLaunch.exe:1804
    AppLaunch.exe:844
    AppLaunch.exe:1704
    AppLaunch.exe:2216
    AppLaunch.exe:1188
    AppLaunch.exe:1800
    AppLaunch.exe:1724
    AppLaunch.exe:2272
    AppLaunch.exe:2148
    wbemcore.exe:1336

  2. Delete the original Backdoor file.
  3. Delete or disinfect the following files created/modified by the Backdoor:

    %Documents and Settings%\%current user%\Application Data\Microsoft\Windows\wbemcore.exe (10 bytes)
    %Documents and Settings%\%current user%\Application Data\Microsoft\Windows\SyncHost.exe (1425 bytes)

  4. Delete the following value(s) in the autorun key (How to Work with System Registry):

    [HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce]
    "Windows Management Instrumentation" = "%Documents and Settings%\%current user%\Application Data\Microsoft\Windows\wbemcore.exe"

  5. Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
  6. Reboot the computer.

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now