GenPack.Generic.Malware.SIBg.20A29979_3fe91d1493

by malwarelabrobot on September 15th, 2016 in Malware Descriptions.

Trojan-Dropper.Win32.Agent.ano (Kaspersky), GenPack:Generic.Malware.SI!Bg.20A29979 (B) (Emsisoft), GenPack:Generic.Malware.SI!Bg.20A29979 (AdAware), Trojan.NSIS.StartPage.FD, Trojan.Win32.Swrort.4.FD, TrojanSwrort.YR, GenericIRCBot.YR (Lavasoft MAS)
Behaviour: Trojan-Dropper, Trojan, IRCBot, Malware


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Requires JavaScript enabled!

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: 3fe91d14931fb6d70d418477a8813407
SHA1: 800ef45b89681d6bfb4770fa942cc4d0cd6a0259
SHA256: 106b1fc62ed0cca20a61d553eb45facbfbfce542057037b040a55b724122bf34
SSDeep: 1536:VMvCvspprwFvG50QctoYRN7dvC8ZtmbycedueXBVRRbWiQXERd7mW:VMavMpcxG5Fq71C8lVRRbW9ERdCW
Size: 89814 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2007-07-14 18:12:49
Analyzed on: WindowsXP SP3 32-bit


Summary:

Trojan-Dropper. Trojan program, intended for stealth installation of other malware into user's system.

Payload

Behaviour Description
IRCBot A bot can communicate with command and control servers via IRC channel.


Process activity

The GenPack creates the following process(es):

systec32.exe:1492
~z545158.tmp:496

The GenPack injects its code into the following process(es):

%original file name%.exe:644

Mutexes

The following mutexes were created/opened:
No objects were found.

File activity

The process ~z545158.tmp:496 makes changes in the file system.
The GenPack creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\HMNHLGIO\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\History\History.IE5\desktop.ini (159 bytes)
%System%\systec32.exe (33 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\PBX2QB5C\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\55UO2EVH\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\CT48K6BI\desktop.ini (67 bytes)

The process %original file name%.exe:644 makes changes in the file system.
The GenPack creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\~z545158.tmp (33 bytes)

The GenPack deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nsv1.tmp (0 bytes)

Registry activity

The process systec32.exe:1492 makes changes in the system registry.
The GenPack creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "30 96 FD DF E3 DC 40 1B E0 20 FD F4 3F 7C 8A 55"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"

To automatically run itself each time Windows is booted, the GenPack adds the following link to its file to the system registry autorun key:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Runservices]
"systec32.exe" = "systec32.exe"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"systec32.exe" = "systec32.exe"

The process ~z545158.tmp:496 makes changes in the system registry.
The GenPack creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E6 FA 61 F1 E6 89 75 25 0F A5 42 E2 65 AD 32 80"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"

The process %original file name%.exe:644 makes changes in the system registry.
The GenPack creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "78 EF 20 CE DE CB 04 F1 03 66 2E 88 91 AD 88 E8"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

Dropped PE files

MD5 File path
8d044d5c3cfda151f961eb26b8558ac2 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\~z545158.tmp
8d044d5c3cfda151f961eb26b8558ac2 c:\WINDOWS\system32\systec32.exe

HOSTS file anomalies

No changes have been detected.

Rootkit activity

No anomalies have been detected.

Propagation

VersionInfo

No information is available.

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
UPX0 4096 204800 0 0 d41d8cd98f00b204e9800998ecf8427e
UPX1 208896 20480 18432 5.44525 2b72c47a9deccd0c25eab5bbf438bba7
.entry 229376 28672 27648 4.00987 0b4972200c4e0642bbecbb7ee1ffc36b
258048 33920 34304 4.35016 63a414472ccbf8aa9bf880fb19ddd256

Dropped from:

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

URLs

URL IP
irc.webchat.org 216.152.78.166


IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

ET CNC Shadowserver Reported CnC Server IP group 22
ET CHAT IRC PONG response
ET TROJAN IRC DNS request on non-standard port
ET CHAT IRC JOIN command
ET CHAT IRC NICK command
ET CHAT IRC USER command
ET CHAT IRC PING command

Traffic

The GenPack connects to the servers at the folowing location(s):

%original file name%.exe_644:

`.entry
t%SPV
tDSSh
.DEFAULT\Control Panel\International
Software\Microsoft\Windows\CurrentVersion
... %d%%
verifying installer: %d%%
unpacking data: %d%%
~nsu.tmp
%u.%u%s%s
RegDeleteKeyExA
%s=%s
*?|<>/":
c:\%original file name%.exe
%original file name%.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsv1.tmp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
GetWindowsDirectoryA
RegEnumKeyA
RegOpenKeyExA
RegDeleteKeyA
RegCloseKey
RegCreateKeyExA
ShellExecuteA
SHFileOperationA
ExitWindowsEx
.text
`.rdata
@.data
.ndata
.rsrc
.wuepOp(oc$s4
NEL \*.*
umKey
11111111111111
@@@`777-
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="X86" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v2.29</description><dependency><dependentAssembly><assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="X86" publicKeyToken="6595b64144ccf1df" language="*" /></dependentAssembly></dependency></assembly>
KERNEL32.DLL
ADVAPI32.dll
COMCTL32.dll
GDI32.dll
ole32.dll
SHELL32.dll
USER32.dll
VERSION.dll
~z545158.tmp
P`.data
.rdata
[email protected]
.idata
systec32.exe
0903176650
irc.webchat.org
[%d-%d-%d %d:%d:%d] %s
%d, %d : USERID : UNIX : %s
PRIVMSG
%s %s :%s
PONG %s
JOIN %s %s
[%s]: Users in %s: %s
[%s]: nick %s already in use.
JOIN
[%s]: %s has joined %s.
[%s]: %s has left %s.
wtf %s?
[%s]: %s has quit(%s).
NICK
[%s]: %s is now known as %s.
[%s]: %s sets mode: %s
[%s]: * %s %s
[%s]: <%s> %s
%s%s%s
PRIVMSG %s :error sending pings to %s.
PRIVMSG %s :finished sending pings to %s.
connection type: %s (%s). local IP address: %d.%d.%d.%d. connected from: %s
%s [%s]
cpu: %dMHz. ram: %dKB total, %dKB free. os: Windows %s (%d.%d, build %d). uptime: Ý %dh %dm
invalid URL.
url visited.
error visiting URL.
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\RunServices
%s\r.bat
%%comspec%% /c %s %s
PRIVMSG %s :couldn't open %s.
file download (%s - %dkb transferred)
update (%s - %dkb transferred)
downloaded %.1f kb to %s @ %.1f kb/sec.
PRIVMSG %s :opened %s.
downloaded %.1f kb to %s @ %.1f kb/sec. updating...
update failed: error executing file.
bad url, or dns error.
USERHOST %s
user %s logged out.
NOTICE %s :%s
screw you %s!
joined channel %s.
NOTICE %s :
VERSION %s
login
password accepted.
user %s(%s) logged in.
$rndnick
rndnick
QUIT :%s
sdbot 0.5b ready. Up Ý %dh %dm.
sdbot 0.5b by [sd] ([email protected]). homepage: hXXp://sdbot.n3.net/
%d. %s
%d. %s = %s
nick
NICK %s
join
PART %s
c_rndnick
%s -> %s
privmsg
ACTION %s
MODE %s
%s %s %s :%s
c_nick
c_join
%s\%s.exe
update (%s)
downloading update from %s...
couldn't execute file.
clone (%s)
clone created on %s:%d, in channel %s.
download (%s)
downloading %s...
redirect (%d->%s:%d)
redirect created on port %d to %s:%d.
c_privmsg
[%s] <%s> %s
[%s] * %s %s
ping (%s)
sending %d pings to %s. packet size: %d, timeout: %d[ms]
icmp.dll not available
spy (%s)
spy created on %s:%d, in channel %s.
USER %s 0 0 :%s
connected to %s.
ICMP.DLL
kernel32.dll
Mozilla/4.0 (compatible)
WININET.DLL
udp $1 100 2048 50
raw PRIVMSG $1 :$chr(1)$2-$chr(1)
ctcp
VirtualQuery failed for %d bytes at address %p
Unknown pseudo relocation protocol version %d.
Unknown pseudo relocation bit size %d.
../../gcc-3.4.5/gcc/config/i386/w32-shared-ptr.c
HttpOpenRequestA
HttpSendRequestA
InternetCrackUrlA
InternetOpenUrlA
ADVAPI32.DLL
KERNEL32.dll
msvcrt.dll
SHELL32.DLL
WSOCK32.DLL

%original file name%.exe_644_rwx_00401000_00036000:

t%SPV
tDSSh
.DEFAULT\Control Panel\International
Software\Microsoft\Windows\CurrentVersion
... %d%%
verifying installer: %d%%
unpacking data: %d%%
~nsu.tmp
%u.%u%s%s
RegDeleteKeyExA
%s=%s
*?|<>/":
c:\%original file name%.exe
%original file name%.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsv1.tmp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
GetWindowsDirectoryA
RegEnumKeyA
RegOpenKeyExA
RegDeleteKeyA
RegCloseKey
RegCreateKeyExA
ShellExecuteA
SHFileOperationA
ExitWindowsEx
.text
`.rdata
@.data
.ndata
.rsrc
.wuepOp(oc$s4
NEL \*.*

%original file name%.exe_644_rwx_0043F000_00009000:

~z545158.tmp
.text
P`.data
.rdata
[email protected]
.idata
systec32.exe
0903176650
irc.webchat.org
[%d-%d-%d %d:%d:%d] %s
%d, %d : USERID : UNIX : %s
PRIVMSG
%s %s :%s
PONG %s
JOIN %s %s
[%s]: Users in %s: %s
[%s]: nick %s already in use.
JOIN
[%s]: %s has joined %s.
[%s]: %s has left %s.
wtf %s?
[%s]: %s has quit(%s).
NICK
[%s]: %s is now known as %s.
[%s]: %s sets mode: %s
[%s]: * %s %s
[%s]: <%s> %s
%s%s%s
PRIVMSG %s :error sending pings to %s.
PRIVMSG %s :finished sending pings to %s.
connection type: %s (%s). local IP address: %d.%d.%d.%d. connected from: %s
%s [%s]
cpu: %dMHz. ram: %dKB total, %dKB free. os: Windows %s (%d.%d, build %d). uptime: Ý %dh %dm
invalid URL.
url visited.
error visiting URL.
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\RunServices
%s\r.bat
%%comspec%% /c %s %s
PRIVMSG %s :couldn't open %s.
file download (%s - %dkb transferred)
update (%s - %dkb transferred)
downloaded %.1f kb to %s @ %.1f kb/sec.
PRIVMSG %s :opened %s.
downloaded %.1f kb to %s @ %.1f kb/sec. updating...
update failed: error executing file.
bad url, or dns error.
USERHOST %s
user %s logged out.
NOTICE %s :%s
screw you %s!
joined channel %s.
NOTICE %s :
VERSION %s
login
password accepted.
user %s(%s) logged in.
$rndnick
rndnick
QUIT :%s
sdbot 0.5b ready. Up Ý %dh %dm.
sdbot 0.5b by [sd] ([email protected]). homepage: hXXp://sdbot.n3.net/
%d. %s
%d. %s = %s
nick
NICK %s
join
PART %s
c_rndnick
%s -> %s
privmsg
ACTION %s
MODE %s
%s %s %s :%s
c_nick
c_join
%s\%s.exe
update (%s)
downloading update from %s...
couldn't execute file.
clone (%s)
clone created on %s:%d, in channel %s.
download (%s)
downloading %s...
redirect (%d->%s:%d)
redirect created on port %d to %s:%d.
c_privmsg
[%s] <%s> %s
[%s] * %s %s
ping (%s)
sending %d pings to %s. packet size: %d, timeout: %d[ms]
icmp.dll not available
spy (%s)
spy created on %s:%d, in channel %s.
USER %s 0 0 :%s
connected to %s.
ICMP.DLL
kernel32.dll
Mozilla/4.0 (compatible)
WININET.DLL
udp $1 100 2048 50
raw PRIVMSG $1 :$chr(1)$2-$chr(1)
ctcp
VirtualQuery failed for %d bytes at address %p
Unknown pseudo relocation protocol version %d.
Unknown pseudo relocation bit size %d.
../../gcc-3.4.5/gcc/config/i386/w32-shared-ptr.c
RegCloseKey
RegCreateKeyExA
ShellExecuteA
HttpOpenRequestA
HttpSendRequestA
InternetCrackUrlA
InternetOpenUrlA
ADVAPI32.DLL
KERNEL32.dll
msvcrt.dll
SHELL32.DLL
WSOCK32.DLL

systec32.exe_1492:

.text
P`.data
.rdata
[email protected]
.idata
systec32.exe
0903176650
irc.webchat.org
[%d-%d-%d %d:%d:%d] %s
%d, %d : USERID : UNIX : %s
PRIVMSG
%s %s :%s
PONG %s
JOIN %s %s
[%s]: Users in %s: %s
[%s]: nick %s already in use.
JOIN
[%s]: %s has joined %s.
[%s]: %s has left %s.
wtf %s?
[%s]: %s has quit(%s).
NICK
[%s]: %s is now known as %s.
[%s]: %s sets mode: %s
[%s]: * %s %s
[%s]: <%s> %s
%s%s%s
PRIVMSG %s :error sending pings to %s.
PRIVMSG %s :finished sending pings to %s.
connection type: %s (%s). local IP address: %d.%d.%d.%d. connected from: %s
%s [%s]
cpu: %dMHz. ram: %dKB total, %dKB free. os: Windows %s (%d.%d, build %d). uptime: Ý %dh %dm
invalid URL.
url visited.
error visiting URL.
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\RunServices
%s\r.bat
%%comspec%% /c %s %s
PRIVMSG %s :couldn't open %s.
file download (%s - %dkb transferred)
update (%s - %dkb transferred)
downloaded %.1f kb to %s @ %.1f kb/sec.
PRIVMSG %s :opened %s.
downloaded %.1f kb to %s @ %.1f kb/sec. updating...
update failed: error executing file.
bad url, or dns error.
USERHOST %s
user %s logged out.
NOTICE %s :%s
screw you %s!
joined channel %s.
NOTICE %s :
VERSION %s
login
password accepted.
user %s(%s) logged in.
$rndnick
rndnick
QUIT :%s
sdbot 0.5b ready. Up Ý %dh %dm.
sdbot 0.5b by [sd] ([email protected]). homepage: hXXp://sdbot.n3.net/
%d. %s
%d. %s = %s
nick
NICK %s
join
PART %s
c_rndnick
%s -> %s
privmsg
ACTION %s
MODE %s
%s %s %s :%s
c_nick
c_join
%s\%s.exe
update (%s)
downloading update from %s...
couldn't execute file.
clone (%s)
clone created on %s:%d, in channel %s.
download (%s)
downloading %s...
redirect (%d->%s:%d)
redirect created on port %d to %s:%d.
c_privmsg
[%s] <%s> %s
[%s] * %s %s
ping (%s)
sending %d pings to %s. packet size: %d, timeout: %d[ms]
icmp.dll not available
spy (%s)
spy created on %s:%d, in channel %s.
USER %s 0 0 :%s
connected to %s.
ICMP.DLL
kernel32.dll
Mozilla/4.0 (compatible)
WININET.DLL
udp $1 100 2048 50
raw PRIVMSG $1 :$chr(1)$2-$chr(1)
ctcp
VirtualQuery failed for %d bytes at address %p
Unknown pseudo relocation protocol version %d.
Unknown pseudo relocation bit size %d.
../../gcc-3.4.5/gcc/config/i386/w32-shared-ptr.c
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
[9-14-2016 14:50:15] joined channel #pnp0807.
[9-14-2016 14:50:14] connected to irc.webchat.org.
RegCloseKey
RegCreateKeyExA
ShellExecuteA
HttpOpenRequestA
HttpSendRequestA
InternetCrackUrlA
InternetOpenUrlA
ADVAPI32.DLL
KERNEL32.dll
msvcrt.dll
SHELL32.DLL
WSOCK32.DLL


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Terminate malicious process(es) (How to End a Process With the Task Manager):

    systec32.exe:1492
    ~z545158.tmp:496

  2. Delete the original GenPack file.
  3. Delete or disinfect the following files created/modified by the GenPack:

    %Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\HMNHLGIO\desktop.ini (67 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
    %Documents and Settings%\%current user%\Local Settings\History\History.IE5\desktop.ini (159 bytes)
    %System%\systec32.exe (33 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\PBX2QB5C\desktop.ini (67 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\55UO2EVH\desktop.ini (67 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\CT48K6BI\desktop.ini (67 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\~z545158.tmp (33 bytes)

  4. Delete the following value(s) in the autorun key (How to Work with System Registry):

    [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Runservices]
    "systec32.exe" = "systec32.exe"

    [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "systec32.exe" = "systec32.exe"

  5. Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
  6. Reboot the computer.

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now