Gaba.A_4 is an Adware. Adware, or advertising-supported software, is any software that automatically renders advertisements in order to generate revenue for its author. The advertisements may be in the user interface of the software or on a screen presented to the user during the installation process. It is usually annoying but harmless, unless it is combined with spyware or trackware. File Related Changes It drops the following file(s) on the system: - "C:\WINDOWS\system32\dllcache\share.exe"
- "C:\Documents and Settings\Admin\Local Settings\Temp\bulpjecmax.bat"
- "C:\WINDOWS\system32\share.exe"
- "C:\WINDOWS\system32\dllcache\uploadm.exe"
Process Related Changes It creates the following mutex(es): - c:!documents and settings!admin!local settings!temporary internet files!content.ie5!"
- ZonesLockedCacheCounterMutex"
- c:!documents and settings!admin!local settings!history!history.ie5!"
- WininetConnectionMutex"
- CTF.TMD.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
- CTF.TimListCache.FMPDefaultS-1-5-21-1078081533-842925246-854245398-1003MUTEX.DefaultS-1-5-21-1078081533-842925246-854245398-1003"
- CTF.Compart.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
- ZoneAttributeCacheCounterMutex"
- c:!documents and settings!admin!ietldcache!"
- ZonesCacheCounterMutex"
- ZonesCounterMutex"
- CTF.Layouts.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
- CTF.Asm.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
- t10"
- CTF.LBES.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
- c:!documents and settings!admin!cookies!"
It creates the following process(es): - C:\WINDOWS\Temp\226b8feae7631240307da8848cf80da1.exe [ \c:\windows\temp\226b8feae7631240307da8848cf80da1.exe ]
- C:\WINDOWS\M-505058029767949206938048603020\winmgr.exe
- C:\WINDOWS\system32\cmd.exe [ cmd /c \C:\DOCUME1\Admin\LOCALS1\Temp\bulpjecmax.bat ]
- C:\WINDOWS\Temp\226b8feae7631240307da8848cf80da1.exe [ \c:\windows\temp\226b8feae7631240307da8848cf80da1.exe ]
It injects malicious code into the following process(es): - "C:\WINDOWS\M-505058029767949206938048603020\winmgr.exe"
Network Activity We observed the following DNS query/queries: It attempts to connect to the following remote servers:
|