Thank you for being a valued part of the CNET community. As of December 1, 2020, the forums are in read-only format. In early 2021, CNET Forums will no longer be available. We are grateful for the participation and advice you have provided to one another over the years.

Thanks,

CNET Support

General discussion

VIRUS \ Spyware ALERTS - January 6, 2009

Jan 5, 2009 1:40PM PST

Discussion is locked

- Collapse -
Troj/Zlob-AAIW
Jan 6, 2009 2:06AM PST
- Collapse -
Troj/FakXPA-Gen
Jan 6, 2009 2:07AM PST
- Collapse -
Troj/FakeAV-IF
Jan 6, 2009 2:08AM PST
- Collapse -
Troj/FakeAle-KP
Jan 6, 2009 2:09AM PST
- Collapse -
Troj/Dowque-Gen
Jan 6, 2009 2:11AM PST
- Collapse -
Troj/CDur-Gen
Jan 6, 2009 2:12AM PST
- Collapse -
Troj/Bckdr-QQX
Jan 6, 2009 2:13AM PST

Aliases BackDoor-CMQ trojan

Category Viruses and Spyware

Type Trojan

Troj/Bckdr-QQX is a Trojan for the Windows platform.

Troj/Bckdr-QQX includes functionality to access the internet and communicate with a remote server via HTTP.

When first run Troj/Bckdr-QQX copies itself to:

<Temp&gtMischief<filename1>.exe
<System&gtMischief<filname2>.exe
<System>\drivers\<filename3>.exe

Where filename1, filename2, filename3 are randomly selected.

The following registry entries are created to run Troj/Bckdr-QQX on startup:

HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
DllHst
<System&gtMischief<filename>.exe /waitservice

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run
DllHst
<System&gtMischief<filename>.exe /waitservice

HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows
load
<System>\drivers\<filename>.exe

Troj/Bckdr-QQX will attempt to connect to a large range of web sites located on three different servers until it finds a working connection.

http://www.sophos.com/security/analyses/viruses-and-spyware/trojbckdrqqx.html?_log_from=rss

- Collapse -
Troj/Agent-INY
Jan 6, 2009 2:14AM PST
- Collapse -
Troj/Agent-INX
Jan 6, 2009 2:15AM PST

Aliases Win32/FakeInit.A

Category Viruses and Spyware

Type Trojan

Troj/Agent-INX is a Trojan for the Windows platform.

Troj/Agent-INX includes functionality to access the internet and communicate with a remote server via HTTP.

When first run Troj/Agent-INX copies itself to:

<System>\dllcache\userinit.exe
<System>\userinit.exe

and creates the following files:

<Temp>\mousehook.dll
<Temp>\ntdll64.dll

Registry entries are created under:

HKCU\Software

http://www.sophos.com/security/analyses/viruses-and-spyware/trojagentinx.html?_log_from=rss

- Collapse -
Mal/ExpressAv-A
Jan 6, 2009 2:16AM PST
- Collapse -
W32/Autorun-TG
Jan 6, 2009 4:57AM PST
- Collapse -
Troj/Banker-EOY
Jan 6, 2009 4:58AM PST
- Collapse -
Troj/Agent-IOA
Jan 6, 2009 4:59AM PST
- Collapse -
W32/Voterai-D
Jan 6, 2009 7:02AM PST
- Collapse -
W32/Azero-B
Jan 6, 2009 7:03AM PST
- Collapse -
W32/Autorun-TF
Jan 6, 2009 7:05AM PST

Aliases W32.SillyFDC
Trojan.Win32.Pakes.ldp
the Generic.dx trojan

Category Viruses and Spyware

Type Worm

W32/Autorun-TF is a worm for the Windows platform which spreads by copying itself to removable devices.

When first run W32/Autorun-TF copies itself to:

<PROGRAM FILES>\Microsoft Common\wuauclt.exe
<root>\autorun.inf

The file autorun.inf is detected as W32/Autorun-IK and W32/Autorun-IN.

The following registry entries are created to run W32/Autorun-TF on startup:

HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\
Debugger
<PROGRAM FILES>\Microsoft Common\wuauclt.exe


http://www.sophos.com/security/analyses/viruses-and-spyware/w32autoruntf.html?_log_from=rss

- Collapse -
Troj/SWFdldr-L
Jan 6, 2009 7:06AM PST
- Collapse -
Troj/OnLineG-G
Jan 6, 2009 7:07AM PST

Aliases Generic PWS.ak
Trojan-GameThief.Win32.Magania.aqto

Category Viruses and Spyware

Type Trojan

Troj/OnLineG-G is a Trojan for the Windows platform.

When first run Troj/OnLineG-G copies itself to <Windows>\Help\EB6C4499B05F.exe and creates the following files:

<Root>\1.hiv
<Root>\2.hiv
<Current Folder>\2.bat
<Windows>\1.bat
<Windows>\Help\EB6C4499B05F.dll

The file EB6C4499B05F.dll also was detected as Mal/LineDLL-B.

The file EB6C4499B05F.dll is registered as a COM object and shell extension, creating registry entries under:

HKCR\CLSID\{1DBD6574-D6D0-4782-94C3-69619E719765}
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{1DBD6574-D6D0-4782-94C3-69619E719765

http://www.sophos.com/security/analyses/viruses-and-spyware/trojonlinegg.html?_log_from=rss

- Collapse -
Troj/JSRedir-F
Jan 6, 2009 7:08AM PST
- Collapse -
Troj/IRCBot-ADG
Jan 6, 2009 7:09AM PST
- Collapse -
Troj/FakeAle-KQ
Jan 6, 2009 7:10AM PST
- Collapse -
Troj/Dloadr-CEI
Jan 6, 2009 7:11AM PST
- Collapse -
Testosterone loader
Jan 6, 2009 7:12AM PST
- Collapse -
SanMaxi KeyLogger
Jan 6, 2009 7:13AM PST
- Collapse -
ContentCleaner
Jan 6, 2009 7:15AM PST