Threat Information for "Trojan.DownLoader.316"

Removal Top

StopSign will automatically remove this infection with a paid membership.

Summary Top
  • Name: Trojan.DownLoader.316
  • Aliases:Win32:Trojano-495 [Trj], TR/Drop.Small.GS.2, Downloader.Small.6.T, Trojan-Downloader.Win32.Small.ij, security risk or a "backdoor" program, Downloader-JU
  • Date Discovered: 2006-01-13
  • Protection Added: 2006-02-23
Description Top
-- Ease of Removal

1: Consistently named
2: Consistent file contents
3: Creates new registry entries with consistent data

-- Damage/Intrusion/Annoyance

1: Autoruns at startup without an option to be disabled

-- Propagation/Saturation

1: Creates new files
Technical Details Top
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\dgsetup.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\gdiplus.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\irclass.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\kbdit.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\localspl.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\mset_bbi80102.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\neth.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\rcbdyctl.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\tapiperf.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\wmadmod.exe
  • Added Directory/File:
    FilePath: %WINDIR%\patchw32.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\asycfilt.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\dsauth.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\iassam.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\kbdbe.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\lfgif11n.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\mmcndmgr.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\mslbui.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\nvrsja.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\scripto.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\usrsdpia.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\zipfldr.exe
  • Added Directory/File:
    FilePath: %WINDIR%\vmmreg32.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\comuid.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\dbnmpntw.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\eventlog.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\ipv6mon.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\kbdic.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\licwmi.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\msdtclog.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\msxbse35.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\psbase.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\srsvc.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\wiaservc.exe
  • Added Directory/File:
    FilePath: %WINDIR%\msto32.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\adsnt.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\dpnwsock.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\iaspolcy.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\jgpl400.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\kbdsw.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\mciavi32.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\msihnd.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\nvrsel.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\sccsccp.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\urlmon.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\wmsdmod.exe
  • Added Directory/File:
    FilePath: %WINDIR%\twain.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\cmcfg32.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\dbghelp.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\dx7vb.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\inetcomm.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\kbdfr.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\licdll.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\mscms.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\mstext40.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\panmap.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\shgina.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\webvw.exe
  • Added Directory/File:
    FilePath: %WINDIR%\inres.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\activeds.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\dmstyle.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\iasads.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\jet500.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\kbdru1.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\lsasrv.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\msftedit.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\ntlanui.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\resutils.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\toolhelp.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\wmpcore.exe
  • Added Directory/File:
    FilePath: %WINDIR%\systb.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\cdintf.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\d3dxof.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\dswave.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\ieakui.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\kbdcz2.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\lftga13n.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\msacm32.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\msnsspc.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\odtext32.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\sfcfiles.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\version.exe
  • Added Directory/File:
    FilePath: %WINDIR%\hcextoutput.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\diskcopy.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\hlinkprx.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\isrdbg32.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\kbdlv1.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\lprmon.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\mset_b~2.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\netlogon.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\rdpsnd.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\tapiui.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\wmasf.exe
  • Added Directory/File:
    FilePath: %WINDIR%\pcdlib32.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\avtapi.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\dsound.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\iassdo.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\kbdcz.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\lfras11n.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\mmcshext.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\msltus40.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\nvwrssv.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\serialui.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\utildll.exe
  • Added Directory/File:
    FilePath: %WINDIR%\bxxs5.exe
  • Added Directory/File:
    FilePath: %WINDIR%\wildapp.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\cryptext.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\devmgr.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\fxsst.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\ipx32d56.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\kbdir.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\loadperf.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\msencode.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\msxml.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\racpldlg.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\syntpcoi.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\winstrm.exe
  • Added Directory/File:
    FilePath: %WINDIR%\nem216.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\adsnw.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\dpvoice.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\iasrecst.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\jscript.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\kbduk.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\mdhcp.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\msjter40.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\nvrseng.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\scredir.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\usrcoina.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\xpsp2res.exe
  • Added Directory/File:
    FilePath: %WINDIR%\twain_32.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\comctl32.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\dbmsrpcn.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\dxtrans.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\ipsecsvc.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\kbdhept.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\licmgr10.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\msctf.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\mswmdm.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\profmap.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\snmpsnap.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\wiadss.exe
  • Added Directory/File:
    FilePath: %WINDIR%\mshp.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\adsmsext.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\dmusic.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\iasperf.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\jgdw400.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\kbdsp.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\mag_hook.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\msident.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\nv4_disp.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\samsrv.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\tscfgwmi.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\wmpui.exe
  • Added Directory/File:
    FilePath: %WINDIR%\tmupdate.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\clbcatex.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\dbgeng.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\duser.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\imeshare.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\kbdfi.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\lfwfx80n.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\mscat32.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\msrd3x40.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\oleaccrc.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\sfwuts20.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\webclnt.exe
  • Added Directory/File:
    FilePath: %WINDIR%\hcexto~1.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\dmband.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\hnetwiz.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\itircl.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\kbdnec95.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\lprmonui.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\msexch40.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\netrap.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\rend.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\tcpmonui.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\wmpcd.exe
  • Added Directory/File:
    FilePath: %WINDIR%\poce98.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\cabview.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\dsuiext.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\idleui.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\kbdcz1.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\lfsct13n.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\msaatext.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\msnetobj.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\odbcji32.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\sfc_os.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\vdmredir.exe
  • Added Directory/File:
    FilePath: %WINDIR%\glcv20dr.exe
  • Added Directory/File:
    FilePath: %WINDIR%\wsem218.exe
  • Added Directory/File:
    FilePath: %SYSTEMDIR%\ctmp3lib.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\cabview.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\dmband.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\hnetwiz.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\itircl.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\kbdnec95.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\lprmonui.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\msexch40.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\netrap.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\rend.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\tcpmonui.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %WINDIR%\poce98.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\wmpcd.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\ctmp3lib.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\dsuiext.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\idleui.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\kbdcz1.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\lfsct13n.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\msaatext.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\msnetobj.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\odbcji32.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\sfc_os.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\vdmredir.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %WINDIR%\wsem218.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %WINDIR%\glcv20dr.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\asycfilt.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\dgsetup.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\gdiplus.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\irclass.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\kbdit.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\localspl.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\mset_bbi80102.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\neth.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\rcbdyctl.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\tapiperf.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %WINDIR%\patchw32.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\wmadmod.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\comuid.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\dsauth.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\iassam.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\kbdbe.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\lfgif11n.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\mmcndmgr.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\mslbui.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\nvrsja.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\scripto.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\usrsdpia.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %WINDIR%\vmmreg32.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\zipfldr.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\adsnt.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\dbnmpntw.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\eventlog.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\ipv6mon.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\kbdic.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\licwmi.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\msdtclog.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\msxbse35.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\psbase.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\srsvc.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %WINDIR%\msto32.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\wiaservc.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\cmcfg32.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\dpnwsock.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\iaspolcy.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\jgpl400.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\kbdsw.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\mciavi32.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\msihnd.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\nvrsel.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\sccsccp.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\urlmon.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %WINDIR%\twain.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\wmsdmod.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\dbghelp.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\dx7vb.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\inetcomm.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\kbdfr.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\licdll.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\mscms.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\mstext40.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\panmap.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\shgina.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\webvw.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\activeds.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %WINDIR%\inres.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\cdintf.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\dmstyle.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\iasads.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\jet500.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\kbdru1.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\lsasrv.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\msftedit.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\ntlanui.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\resutils.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\toolhelp.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %WINDIR%\systb.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\wmpcore.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\d3dxof.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\dswave.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\ieakui.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\kbdcz2.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\lftga13n.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\msacm32.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\msnsspc.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\odtext32.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\sfcfiles.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\version.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %WINDIR%\hcextoutput.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\avtapi.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\diskcopy.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\hlinkprx.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\isrdbg32.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\kbdlv1.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\lprmon.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\mset_b~2.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\netlogon.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\rdpsnd.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\tapiui.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %WINDIR%\pcdlib32.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\wmasf.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\cryptext.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\dsound.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\iassdo.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\kbdcz.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\lfras11n.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\mmcshext.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\msltus40.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\nvwrssv.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\serialui.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\utildll.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %WINDIR%\wildapp.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %WINDIR%\bxxs5.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\adsnw.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\devmgr.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\fxsst.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\ipx32d56.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\kbdir.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\loadperf.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\msencode.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\msxml.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\racpldlg.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\syntpcoi.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %WINDIR%\nem216.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\winstrm.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\comctl32.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\dpvoice.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\iasrecst.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\jscript.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\kbduk.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\mdhcp.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\msjter40.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\nvrseng.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\scredir.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\usrcoina.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %WINDIR%\twain_32.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\xpsp2res.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\dbmsrpcn.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\dxtrans.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\ipsecsvc.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\kbdhept.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\licmgr10.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\msctf.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\mswmdm.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\profmap.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\snmpsnap.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\adsmsext.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\wiadss.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %WINDIR%\mshp.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\clbcatex.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\dmusic.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\iasperf.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\jgdw400.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\kbdsp.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\mag_hook.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\msident.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\nv4_disp.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\samsrv.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\tscfgwmi.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %WINDIR%\tmupdate.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\wmpui.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\dbgeng.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\duser.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\imeshare.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\kbdfi.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\lfwfx80n.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\mscat32.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\msrd3x40.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\oleaccrc.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\sfwuts20.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %SYSTEMDIR%\webclnt.exe
  • Added Registry Data:
    Key: HKLM\%CURRENTVERSIONREG%\Run Value: [RANDOM VALUE] Data: %WINDIR%\hcexto~1.exe