6to4v32.dll - Dangerous
6to4v32.dll
Manual removal instructions:
Antivirus Report of 6to4v32.dll:
6to4v32.dll
We suggest you to remove 6to4v32.dll from your computer as soon as possible.
6to4v32.dll is Trojan/Backdoor.
Kill the file 6to4v32.dll and remove 6to4v32.dll from Windows startup.
File: 612.exe (C:\sand-box\612.exe)
Classification:
Antivirus Version Last Update Result
Avast 4.8.1335.0 2009.07.09 -
AVG 8.5.0.387 2009.07.10 -
BitDefender 7.2 2009.07.10 -
Comodo 1605 2009.07.10 -
DrWeb 5.0.0.12182 2009.07.10 -
F-Secure 8.0.14470.0 2009.07.10 -
Kaspersky 7.0.0.125 2009.07.10 -
Microsoft 1.4803 2009.07.10 Trojan:Win32/Wimpixo.gen!A
NOD32 4232 2009.07.10 -
Symantec 1.4.4.12 2009.07.10 -
Additional information
File size: 50688 bytes
MD5 : 939c7470aa996a41b96a4980f6990361
SHA1 : ce2f530e441fa771fa332b247763b898afbc155f
Installation
When the program is executed, it creates the following registry subkeys and values:
----------------------------------
Keys added:9
----------------------------------
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_6TO4
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_6TO4\0000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_PCMSTUB
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_PCMSTUB\0000
HKLM\SYSTEM\CurrentControlSet\Services\6to4
HKLM\SYSTEM\CurrentControlSet\Services\6to4\Parameters
HKLM\SYSTEM\CurrentControlSet\Services\6to4\Security
HKLM\SYSTEM\CurrentControlSet\Services\pcmstub
HKLM\SYSTEM\CurrentControlSet\Services\pcmstub\Security
----------------------------------
Values added:29
----------------------------------
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_6TO4\0000\Service: "6to4"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_6TO4\0000\Legacy: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_6TO4\0000\ConfigFlags: 0x00000000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_6TO4\0000\Class: "LegacyDriver"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_6TO4\0000\ClassGUID: "{8ECC055D-047F-11D1-A537-0000F8753ED1}"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_6TO4\0000\DeviceDesc: "6to4"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_6TO4\NextInstance: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_PCMSTUB\0000\Service: "pcmstub"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_PCMSTUB\0000\Legacy: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_PCMSTUB\0000\ConfigFlags: 0x00000000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_PCMSTUB\0000\Class: "LegacyDriver"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_PCMSTUB\0000\ClassGUID: "{8ECC055D-047F-11D1-A537-0000F8753ED1}"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_PCMSTUB\0000\DeviceDesc: "pcmstub"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_PCMSTUB\NextInstance: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Services\6to4\Security\Security: 01 00 14 80 90 00 00 00 9C 00 00 00 14 00 00 00 30 00 00 00 02 00 1C 00 01 00 00 00 02 80 14 00 FF 01 0F 00 01 01 00 00 00 00 00 01 00 00 00 00 02 00 60 00 04 00 00 00 00 00 14 00 FD 01 02 00 01 01 00 00 00 00 00 05 12 00 00 00 00 00 18 00 FF 01 0F 00 01 02 00 00 00 00 00 05 20 00 00 00 20 02 00 00 00 00 14 00 8D 01 02 00 01 01 00 00 00 00 00 05 0B 00 00 00 00 00 18 00 FD 01 02 00 01 02 00 00 00 00 00 05 20 00 00 00 23 02 00 00 01 01 00 00 00 00 00 05 12 00 00 00 01 01 00 00 00 00 00 05 12 00 00 00
HKLM\SYSTEM\CurrentControlSet\Services\6to4\Parameters\ServiceDll: "C:\WINDOWS\system32\6to4v32.dll"
HKLM\SYSTEM\CurrentControlSet\Services\6to4\Type: 0x00000120
HKLM\SYSTEM\CurrentControlSet\Services\6to4\Start: 0x00000002
HKLM\SYSTEM\CurrentControlSet\Services\6to4\ErrorControl: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Services\6to4\ImagePath: "%SystemRoot%\System32\svchost.exe -k netsvcs"
HKLM\SYSTEM\CurrentControlSet\Services\6to4\DisplayName: "6to4"
HKLM\SYSTEM\CurrentControlSet\Services\6to4\ObjectName: "LocalSystem"
HKLM\SYSTEM\CurrentControlSet\Services\pcmstub\Security\Security: 01 00 14 80 90 00 00 00 9C 00 00 00 14 00 00 00 30 00 00 00 02 00 1C 00 01 00 00 00 02 80 14 00 FF 01 0F 00 01 01 00 00 00 00 00 01 00 00 00 00 02 00 60 00 04 00 00 00 00 00 14 00 FD 01 02 00 01 01 00 00 00 00 00 05 12 00 00 00 00 00 18 00 FF 01 0F 00 01 02 00 00 00 00 00 05 20 00 00 00 20 02 00 00 00 00 14 00 8D 01 02 00 01 01 00 00 00 00 00 05 0B 00 00 00 00 00 18 00 FD 01 02 00 01 02 00 00 00 00 00 05 20 00 00 00 23 02 00 00 01 01 00 00 00 00 00 05 12 00 00 00 01 01 00 00 00 00 00 05 12 00 00 00
HKLM\SYSTEM\CurrentControlSet\Services\pcmstub\Type: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Services\pcmstub\Start: 0x00000003
HKLM\SYSTEM\CurrentControlSet\Services\pcmstub\ErrorControl: 0x00000000
HKLM\SYSTEM\CurrentControlSet\Services\pcmstub\ImagePath: "\??\C:\WINDOWS\system32\pcmstub.sys"
HKLM\SYSTEM\CurrentControlSet\Services\pcmstub\DisplayName: "pcmstub"
HKLM\SYSTEM\CurrentControlSet\Services\pcmstub\Description: "pcmstub"
----------------------------------
Values modified:0
----------------------------------
----------------------------------
Files added:2
----------------------------------
C:\WINDOWS\system32\6to4v32.dll
C:\WINDOWS\system32\pcmstub.sys
----------------------------------
Files deleted:1
----------------------------------
C:\sand-box\612.exe
----------------------------------
Files [attributes?] modified:0
----------------------------------
----------------------------------
Folders added:0
----------------------------------
----------------------------------
Folders deleted:0
----------------------------------
----------------------------------
Total changes:41
----------------------------------
-------------------------------------------------------------------------------------
Detected by RegRun Reanimator:
Item Name: 6to4
Author: Unknown
Related File: C:\WINDOWS\system32\6to4v32.dll
Type: Svchost DLLs
After first reboot detected by RegRun Reanimator:
Item Name: pcmstub
Author:
Related File: \??\C:\WINDOWS\system32\pcmstub.sys
Type: Services detected by Partizan
Removal Results: Success
Number of reboot: 2
-------------------------------------------------------------------------------------
Recommended software:
UnHackMe anti-rootkit and anti-malware
http://www.unhackme.com
RegRun Security Suite (Good choice for removal and protection)
6to4v32.dll | Malware |
6to4v32.dll | Dangerous |
6to4v32.dll | High Risk |
6to4v32.dll is Trojan/Backdoor.
Kill the file 6to4v32.dll and remove 6to4v32.dll from Windows startup.
File: 612.exe (C:\sand-box\612.exe)
Classification:
Antivirus Version Last Update Result
Avast 4.8.1335.0 2009.07.09 -
AVG 8.5.0.387 2009.07.10 -
BitDefender 7.2 2009.07.10 -
Comodo 1605 2009.07.10 -
DrWeb 5.0.0.12182 2009.07.10 -
F-Secure 8.0.14470.0 2009.07.10 -
Kaspersky 7.0.0.125 2009.07.10 -
Microsoft 1.4803 2009.07.10 Trojan:Win32/Wimpixo.gen!A
NOD32 4232 2009.07.10 -
Symantec 1.4.4.12 2009.07.10 -
Additional information
File size: 50688 bytes
MD5 : 939c7470aa996a41b96a4980f6990361
SHA1 : ce2f530e441fa771fa332b247763b898afbc155f
Installation
When the program is executed, it creates the following registry subkeys and values:
----------------------------------
Keys added:9
----------------------------------
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_6TO4
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_6TO4\0000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_PCMSTUB
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_PCMSTUB\0000
HKLM\SYSTEM\CurrentControlSet\Services\6to4
HKLM\SYSTEM\CurrentControlSet\Services\6to4\Parameters
HKLM\SYSTEM\CurrentControlSet\Services\6to4\Security
HKLM\SYSTEM\CurrentControlSet\Services\pcmstub
HKLM\SYSTEM\CurrentControlSet\Services\pcmstub\Security
----------------------------------
Values added:29
----------------------------------
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_6TO4\0000\Service: "6to4"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_6TO4\0000\Legacy: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_6TO4\0000\ConfigFlags: 0x00000000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_6TO4\0000\Class: "LegacyDriver"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_6TO4\0000\ClassGUID: "{8ECC055D-047F-11D1-A537-0000F8753ED1}"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_6TO4\0000\DeviceDesc: "6to4"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_6TO4\NextInstance: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_PCMSTUB\0000\Service: "pcmstub"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_PCMSTUB\0000\Legacy: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_PCMSTUB\0000\ConfigFlags: 0x00000000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_PCMSTUB\0000\Class: "LegacyDriver"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_PCMSTUB\0000\ClassGUID: "{8ECC055D-047F-11D1-A537-0000F8753ED1}"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_PCMSTUB\0000\DeviceDesc: "pcmstub"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_PCMSTUB\NextInstance: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Services\6to4\Security\Security: 01 00 14 80 90 00 00 00 9C 00 00 00 14 00 00 00 30 00 00 00 02 00 1C 00 01 00 00 00 02 80 14 00 FF 01 0F 00 01 01 00 00 00 00 00 01 00 00 00 00 02 00 60 00 04 00 00 00 00 00 14 00 FD 01 02 00 01 01 00 00 00 00 00 05 12 00 00 00 00 00 18 00 FF 01 0F 00 01 02 00 00 00 00 00 05 20 00 00 00 20 02 00 00 00 00 14 00 8D 01 02 00 01 01 00 00 00 00 00 05 0B 00 00 00 00 00 18 00 FD 01 02 00 01 02 00 00 00 00 00 05 20 00 00 00 23 02 00 00 01 01 00 00 00 00 00 05 12 00 00 00 01 01 00 00 00 00 00 05 12 00 00 00
HKLM\SYSTEM\CurrentControlSet\Services\6to4\Parameters\ServiceDll: "C:\WINDOWS\system32\6to4v32.dll"
HKLM\SYSTEM\CurrentControlSet\Services\6to4\Type: 0x00000120
HKLM\SYSTEM\CurrentControlSet\Services\6to4\Start: 0x00000002
HKLM\SYSTEM\CurrentControlSet\Services\6to4\ErrorControl: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Services\6to4\ImagePath: "%SystemRoot%\System32\svchost.exe -k netsvcs"
HKLM\SYSTEM\CurrentControlSet\Services\6to4\DisplayName: "6to4"
HKLM\SYSTEM\CurrentControlSet\Services\6to4\ObjectName: "LocalSystem"
HKLM\SYSTEM\CurrentControlSet\Services\pcmstub\Security\Security: 01 00 14 80 90 00 00 00 9C 00 00 00 14 00 00 00 30 00 00 00 02 00 1C 00 01 00 00 00 02 80 14 00 FF 01 0F 00 01 01 00 00 00 00 00 01 00 00 00 00 02 00 60 00 04 00 00 00 00 00 14 00 FD 01 02 00 01 01 00 00 00 00 00 05 12 00 00 00 00 00 18 00 FF 01 0F 00 01 02 00 00 00 00 00 05 20 00 00 00 20 02 00 00 00 00 14 00 8D 01 02 00 01 01 00 00 00 00 00 05 0B 00 00 00 00 00 18 00 FD 01 02 00 01 02 00 00 00 00 00 05 20 00 00 00 23 02 00 00 01 01 00 00 00 00 00 05 12 00 00 00 01 01 00 00 00 00 00 05 12 00 00 00
HKLM\SYSTEM\CurrentControlSet\Services\pcmstub\Type: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Services\pcmstub\Start: 0x00000003
HKLM\SYSTEM\CurrentControlSet\Services\pcmstub\ErrorControl: 0x00000000
HKLM\SYSTEM\CurrentControlSet\Services\pcmstub\ImagePath: "\??\C:\WINDOWS\system32\pcmstub.sys"
HKLM\SYSTEM\CurrentControlSet\Services\pcmstub\DisplayName: "pcmstub"
HKLM\SYSTEM\CurrentControlSet\Services\pcmstub\Description: "pcmstub"
----------------------------------
Values modified:0
----------------------------------
----------------------------------
Files added:2
----------------------------------
C:\WINDOWS\system32\6to4v32.dll
C:\WINDOWS\system32\pcmstub.sys
----------------------------------
Files deleted:1
----------------------------------
C:\sand-box\612.exe
----------------------------------
Files [attributes?] modified:0
----------------------------------
----------------------------------
Folders added:0
----------------------------------
----------------------------------
Folders deleted:0
----------------------------------
----------------------------------
Total changes:41
----------------------------------
-------------------------------------------------------------------------------------
Detected by RegRun Reanimator:
Item Name: 6to4
Author: Unknown
Related File: C:\WINDOWS\system32\6to4v32.dll
Type: Svchost DLLs
After first reboot detected by RegRun Reanimator:
Item Name: pcmstub
Author:
Related File: \??\C:\WINDOWS\system32\pcmstub.sys
Type: Services detected by Partizan
Removal Results: Success
Number of reboot: 2
-------------------------------------------------------------------------------------
Recommended software:
UnHackMe anti-rootkit and anti-malware
http://www.unhackme.com
RegRun Security Suite (Good choice for removal and protection)
Dmitry Sokolov:
I created UnHackMe in 2006 to fix the problem that antivioruses did not fix: detecting rootkits.
Since that time I work every day to fix the issues that antiviruses cannot.
If your antivirus have not helped you solve the problem, you should try UnHackMe.
We are a small company and you can ask me directly, if you have any questions.