I recommend you UnHackMe - Ultimate Malware Killer for fast malware removal:
Free DownloadFully Functional 30-day Trial. No credit card is required.
Reviews. EULA. Privacy Policy. Uninstall.
TEM81.EXE – Trojan Agent removal
File | MD5 | Virus Alias |
---|---|---|
TEM81.EXE | bd24082b7dd975d06982ff1a8cd789a8 | Trojan Agent |
TEM81.EXE | bd24082b7dd975d06982ff1a8cd789a8 | Trojan MulDrop4 |
TEM81.EXE | bd24082b7dd975d06982ff1a8cd789a8 | Trojan Downloader |
TEM81.EXE | bd24082b7dd975d06982ff1a8cd789a8 | Worm Viking |
TEM81.EXE | bd24082b7dd975d06982ff1a8cd789a8 | Worm Autorun |
TEM81.EXE size: 23552 bytes
TEM81.EXE hash: BD24082B7DD975D06982FF1A8CD789A8
Created files:
%SysDir%\6to4.dll
%SysDir%\dllcache\6to4.dll
%SysDir%\dllcache\Ias.dll
%SysDir%\dllcache\Irmon.dll
%SysDir%\Ias.dll
%SysDir%\Iprip.dll
%SysDir%\Irmon.dll
%TEMP%\tem81.exe
Autostart registry keys:
HKLM\System\CurrentControlSet\Services\6to4\Type: 20000000
HKLM\System\CurrentControlSet\Services\6to4\Start: 02000000
HKLM\System\CurrentControlSet\Services\6to4\ErrorControl: 01000000
HKLM\System\CurrentControlSet\Services\6to4\DisplayName: 6to4
HKLM\System\CurrentControlSet\Services\6to4\ImagePath: %SystemRoot%\System32\svchost.exe -k netsvcs
HKLM\System\CurrentControlSet\Services\6to4\SBIE_Win32ExitCode: 7F000000
HKLM\System\CurrentControlSet\Services\6to4\Parameters\ServiceDll: 43003A005C00570049004E0044004F00570053005C00730079007300740065006D00330032005C00360074006F0034002E0064006C006C000000
HKLM\System\CurrentControlSet\Services\Ias\Type: 20000000
HKLM\System\CurrentControlSet\Services\Ias\Start: 02000000
HKLM\System\CurrentControlSet\Services\Ias\ErrorControl: 01000000
HKLM\System\CurrentControlSet\Services\Ias\DisplayName: Ias
HKLM\System\CurrentControlSet\Services\Ias\ImagePath: %SystemRoot%\System32\svchost.exe -k netsvcs
HKLM\System\CurrentControlSet\Services\Ias\Parameters\ServiceDll: 43003A005C00570049004E0044004F00570053005C00730079007300740065006D00330032005C004900610073002E0064006C006C000000
HKLM\System\CurrentControlSet\Services\Iprip\Type: 20000000
HKLM\System\CurrentControlSet\Services\Iprip\Start: 02000000
HKLM\System\CurrentControlSet\Services\Iprip\ErrorControl: 01000000
HKLM\System\CurrentControlSet\Services\Iprip\DisplayName: Iprip
HKLM\System\CurrentControlSet\Services\Iprip\ImagePath: %SystemRoot%\System32\svchost.exe -k netsvcs
HKLM\System\CurrentControlSet\Services\Iprip\Parameters\ServiceDll: 43003A005C00570049004E0044004F00570053005C00730079007300740065006D00330032005C00490070007200690070002E0064006C006C000000
HKLM\System\CurrentControlSet\Services\Irmon\Type: 20000000
HKLM\System\CurrentControlSet\Services\Irmon\Start: 02000000
HKLM\System\CurrentControlSet\Services\Irmon\ErrorControl: 01000000
HKLM\System\CurrentControlSet\Services\Irmon\DisplayName: Irmon
HKLM\System\CurrentControlSet\Services\Irmon\ImagePath: %SystemRoot%\System32\svchost.exe -k netsvcs
HKLM\System\CurrentControlSet\Services\Irmon\Parameters\ServiceDll: 43003A005C00570049004E0044004F00570053005C00730079007300740065006D00330032005C00490072006D006F006E002E0064006C006C000000
Detected by UnHackMe:
TEM81.EXE
Default location: %TEMP%\TEM81.EXE
Dropper information:
MD5: e7d313be50db0730dce88ca8488bae42
File size: 684544 bytes