TEM81.EXE – Trojan Agent

I recommend you UnHackMe - Ultimate Malware Killer for fast malware removal:

Free Download
Fully Functional 30-day Trial. No credit card is required.
Reviews
. EULA. Privacy Policy. Uninstall.

TEM81.EXE – Trojan Agent removal

FileMD5Virus Alias
TEM81.EXE bd24082b7dd975d06982ff1a8cd789a8 Trojan Agent
TEM81.EXE bd24082b7dd975d06982ff1a8cd789a8 Trojan MulDrop4
TEM81.EXE bd24082b7dd975d06982ff1a8cd789a8 Trojan Downloader
TEM81.EXE bd24082b7dd975d06982ff1a8cd789a8 Worm Viking
TEM81.EXE bd24082b7dd975d06982ff1a8cd789a8 Worm Autorun

TEM81.EXE size: 23552 bytes
TEM81.EXE hash: BD24082B7DD975D06982FF1A8CD789A8

Created files:

%SysDir%\6to4.dll
%SysDir%\dllcache\6to4.dll
%SysDir%\dllcache\Ias.dll
%SysDir%\dllcache\Irmon.dll
%SysDir%\Ias.dll
%SysDir%\Iprip.dll
%SysDir%\Irmon.dll
%TEMP%\tem81.exe

Autostart registry keys:

HKLM\System\CurrentControlSet\Services\6to4\Type: 20000000
HKLM\System\CurrentControlSet\Services\6to4\Start: 02000000
HKLM\System\CurrentControlSet\Services\6to4\ErrorControl: 01000000
HKLM\System\CurrentControlSet\Services\6to4\DisplayName: 6to4
HKLM\System\CurrentControlSet\Services\6to4\ImagePath: %SystemRoot%\System32\svchost.exe -k netsvcs
HKLM\System\CurrentControlSet\Services\6to4\SBIE_Win32ExitCode: 7F000000
HKLM\System\CurrentControlSet\Services\6to4\Parameters\ServiceDll: 43003A005C00570049004E0044004F00570053005C00730079007300740065006D00330032005C00360074006F0034002E0064006C006C000000
HKLM\System\CurrentControlSet\Services\Ias\Type: 20000000
HKLM\System\CurrentControlSet\Services\Ias\Start: 02000000
HKLM\System\CurrentControlSet\Services\Ias\ErrorControl: 01000000
HKLM\System\CurrentControlSet\Services\Ias\DisplayName: Ias
HKLM\System\CurrentControlSet\Services\Ias\ImagePath: %SystemRoot%\System32\svchost.exe -k netsvcs
HKLM\System\CurrentControlSet\Services\Ias\Parameters\ServiceDll: 43003A005C00570049004E0044004F00570053005C00730079007300740065006D00330032005C004900610073002E0064006C006C000000
HKLM\System\CurrentControlSet\Services\Iprip\Type: 20000000
HKLM\System\CurrentControlSet\Services\Iprip\Start: 02000000
HKLM\System\CurrentControlSet\Services\Iprip\ErrorControl: 01000000
HKLM\System\CurrentControlSet\Services\Iprip\DisplayName: Iprip
HKLM\System\CurrentControlSet\Services\Iprip\ImagePath: %SystemRoot%\System32\svchost.exe -k netsvcs
HKLM\System\CurrentControlSet\Services\Iprip\Parameters\ServiceDll: 43003A005C00570049004E0044004F00570053005C00730079007300740065006D00330032005C00490070007200690070002E0064006C006C000000
HKLM\System\CurrentControlSet\Services\Irmon\Type: 20000000
HKLM\System\CurrentControlSet\Services\Irmon\Start: 02000000
HKLM\System\CurrentControlSet\Services\Irmon\ErrorControl: 01000000
HKLM\System\CurrentControlSet\Services\Irmon\DisplayName: Irmon
HKLM\System\CurrentControlSet\Services\Irmon\ImagePath: %SystemRoot%\System32\svchost.exe -k netsvcs
HKLM\System\CurrentControlSet\Services\Irmon\Parameters\ServiceDll: 43003A005C00570049004E0044004F00570053005C00730079007300740065006D00330032005C00490072006D006F006E002E0064006C006C000000

Detected by UnHackMe:

TEM81.EXE
Default location: %TEMP%\TEM81.EXE

Dropper information:
MD5: e7d313be50db0730dce88ca8488bae42
File size: 684544 bytes

Leave a Reply