Buzus.IOFC is a Trojan. A Trojan is a program that pretends to have a valid use, but in fact modifies the user's computer in malicious ways. Trojans do not replicate or spread to other computers. File Related Changes It drops the following file(s) on the system: - "C:\WINDOWS\$NtUninstallKB59939$\3518678118\L\ujfokwwo"
Process Related Changes It creates the following mutex(es): - CTF.TMD.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
- A"
- CTF.TimListCache.FMPDefaultS-1-5-21-1078081533-842925246-854245398-1003MUTEX.DefaultS-1-5-21-1078081533-842925246-854245398-1003"
- CTF.Compart.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
- SHIMLIB_LOG_MUTEX"
- CTF.Layouts.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
- zxss4"
- CTF.Asm.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
- CTF.LBES.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
It creates the following process(es): - C:\WINDOWS\explorer.exe [ 00000024* ]
- C:\Documents and Settings\Admin\toast.exe [ toast.exe ]
- C:\Documents and Settings\Admin\woast.exe
- C:\Documents and Settings\Admin\toast.exe
- C:\Documents and Settings\Admin\xuXKCQEP.exe
- C:\WINDOWS\Temp\a0d7d92b0858c1189dbcbdc21c443c12.exe [ a0d7d92b0858c1189dbcbdc21c443c12.exe ]
- C:\WINDOWS\Temp\a0d7d92b0858c1189dbcbdc21c443c12.exe [ \c:\windows\temp\a0d7d92b0858c1189dbcbdc21c443c12.exe ]
- C:\Documents and Settings\Admin\voast.exe [ voast.exe ]
- C:\Documents and Settings\Admin\voast.exe
It injects malicious code into the following process(es): - "C:\Documents and Settings\Admin\toast.exe"
- "C:\Documents and Settings\Admin\voast.exe"
- "C:\WINDOWS\explorer.exe"
- "C:\WINDOWS\system32\winlogon.exe"
Network Activity It attempts to connect to the following remote servers: Registry Related Changes It makes the following registry modifications to ensure infection after system reboot: - HKU\s-1-5-21-1078081533-842925246-854245398-1003\Software\Microsoft\Windows\CurrentVersion\Run\xuxkcqep = C:\DocumentsandSettings\Admin\xuXKCQEP.exe/u
- HKU\s-1-5-21-1078081533-842925246-854245398-1003\Software\Microsoft\Windows\CurrentVersion\Run\xuxkcqep = C:\DocumentsandSettings\Admin\xuXKCQEP.exe/n
|