Quantcast
Channel: How to Remove Malware
Viewing all articles
Browse latest Browse all 38585

MR.EXE is Backdoor Poison.dyvj

$
0
0

The program MR.EXE is used for hidden penetration into PC and its remote administration.
UnHackMe is recommended as a reliable program for solving the problem with MR.EXE.
Download for free: http://www.unhackme.com

Malware Analysis of MR.EXE
Full path on a computer: %SysDir%\drivers\mr.exe

Detected by UnHackMe:

MR.EXE
Default location: %SysDir%\drivers\mr.exe

Removal Results: Success
Number of reboot: 1

MR.EXE is known as:

Backdoor.Poison.dyvj, Backdoor.Poison.5amJngoSxg0, Trojan.Agent.Gen-Poison, TrojWare.VB.OSKB, Trojan.Siggen4.22348, Backdoor.Poison.dyvj (v), Troj.Poison-EX, Backdoor.Poison.afku, Backdoor.Poison, Trojan.Msposer.I, Trojan.Swisyn.943377, Trojan.Swisyn, Hoax.Xorist, Malware.Gosys.rem, a variant of Win32.VB.QQC, Trojan.QOT.4901, Trojan.VB, W32.Mofksys.ABZH.tr, VB.CKVR

MR.EXE hash:

  • MD5: 9c041415d8fa33dc2fac1ea40fd96011
How to quickly detect MR.EXE presence?
Registry:
  • HKLM\Software\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath: “c:\windows\system32\drivers\mr.exe”
  • HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce\Explorer: “c:\windows\system\explorer.exe RO”
  • HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce\Svchost: “c:\windows\system32\drivers\svchost.exe RO”
  • HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell: “%WinDir%\explorer.exe, c:\windows\system\explorer.exe”
  • HKLM\System\CurrentControlSet\Services\SharedAccess\Start: 0×00000004
Files:
  • %WinDir%\system\explorer.exe
  • %WinDir%\system\scm.cmn
  • %SysDir%\drivers\mr.exe
  • %SysDir%\drivers\spoolsv.exe
  • %SysDir%\drivers\svchost.exe


Viewing all articles
Browse latest Browse all 38585

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>