6TO4.DLL – Worm Autorun

I recommend you UnHackMe - Ultimate Malware Killer for fast malware removal:

Free Download
Fully Functional 30-day Trial. No credit card is required.
Reviews
. EULA. Privacy Policy. Uninstall.

6TO4.DLL – Worm Autorun removal

FileMD5Virus Alias
6TO4.DLL 36a9a2fe9bbbda35d4f588d9a0dbb115 Worm Autorun
6TO4.DLL 36a9a2fe9bbbda35d4f588d9a0dbb115 Trojan Generic
6TO4.DLL 36a9a2fe9bbbda35d4f588d9a0dbb115 Trojan Hllw
6TO4.DLL 36a9a2fe9bbbda35d4f588d9a0dbb115 Worm Viking
6TO4.DLL 36a9a2fe9bbbda35d4f588d9a0dbb115 Trojan Agent

6TO4.DLL size: 19456 bytes
6TO4.DLL hash: 36A9A2FE9BBBDA35D4F588D9A0DBB115

Created files:

%SysDir%\6to4.dll
%SysDir%\dllcache\6to4.dll
%SysDir%\dllcache\Ias.dll
%SysDir%\dllcache\Irmon.dll
%SysDir%\Ias.dll
%SysDir%\Iprip.dll
%SysDir%\Irmon.dll
%TEMP%\tem81.exe

Autostart registry keys:

HKLM\System\CurrentControlSet\Services\6to4\Type: 20000000
HKLM\System\CurrentControlSet\Services\6to4\Start: 02000000
HKLM\System\CurrentControlSet\Services\6to4\ErrorControl: 01000000
HKLM\System\CurrentControlSet\Services\6to4\DisplayName: 6to4
HKLM\System\CurrentControlSet\Services\6to4\ImagePath: %SystemRoot%\System32\svchost.exe -k netsvcs
HKLM\System\CurrentControlSet\Services\6to4\SBIE_Win32ExitCode: 7F000000
HKLM\System\CurrentControlSet\Services\6to4\Parameters\ServiceDll: 43003A005C00570049004E0044004F00570053005C00730079007300740065006D00330032005C00360074006F0034002E0064006C006C000000
HKLM\System\CurrentControlSet\Services\Ias\Type: 20000000
HKLM\System\CurrentControlSet\Services\Ias\Start: 02000000
HKLM\System\CurrentControlSet\Services\Ias\ErrorControl: 01000000
HKLM\System\CurrentControlSet\Services\Ias\DisplayName: Ias
HKLM\System\CurrentControlSet\Services\Ias\ImagePath: %SystemRoot%\System32\svchost.exe -k netsvcs
HKLM\System\CurrentControlSet\Services\Ias\Parameters\ServiceDll: 43003A005C00570049004E0044004F00570053005C00730079007300740065006D00330032005C004900610073002E0064006C006C000000
HKLM\System\CurrentControlSet\Services\Iprip\Type: 20000000
HKLM\System\CurrentControlSet\Services\Iprip\Start: 02000000
HKLM\System\CurrentControlSet\Services\Iprip\ErrorControl: 01000000
HKLM\System\CurrentControlSet\Services\Iprip\DisplayName: Iprip
HKLM\System\CurrentControlSet\Services\Iprip\ImagePath: %SystemRoot%\System32\svchost.exe -k netsvcs
HKLM\System\CurrentControlSet\Services\Iprip\Parameters\ServiceDll: 43003A005C00570049004E0044004F00570053005C00730079007300740065006D00330032005C00490070007200690070002E0064006C006C000000
HKLM\System\CurrentControlSet\Services\Irmon\Type: 20000000
HKLM\System\CurrentControlSet\Services\Irmon\Start: 02000000
HKLM\System\CurrentControlSet\Services\Irmon\ErrorControl: 01000000
HKLM\System\CurrentControlSet\Services\Irmon\DisplayName: Irmon
HKLM\System\CurrentControlSet\Services\Irmon\ImagePath: %SystemRoot%\System32\svchost.exe -k netsvcs
HKLM\System\CurrentControlSet\Services\Irmon\Parameters\ServiceDll: 43003A005C00570049004E0044004F00570053005C00730079007300740065006D00330032005C00490072006D006F006E002E0064006C006C000000

Detected by UnHackMe:

6TO4.DLL
Default location: %SYSDIR%\DLLCACHE\6TO4.DLL

Dropper information:
MD5: e7d313be50db0730dce88ca8488bae42
File size: 684544 bytes

Leave a Reply