musirc4.72.exe - Dangerous
musirc4.72.exe
Manual removal instructions:
Antivirus Report of musirc4.72.exe:
musirc4.72.exe
W32.Randex.AI is a network-aware worm that will attempt to connect to a predetermined IRC server to receive instructions from an attacker.
Spreads itself to other systems on the same network.
Allows unauthorized remote execution of commands on an infected computer.
Adds the value: "MusIRC (irc.music.com) client"="musirc4.72.exe"
to the registry keys:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices
Attempts to authenticate itself to randomly generated IP addresses.
Copies itself to the following remote locations when a successful connection is made:
\ADMIN$\system32\musirc4.72.exe
\C$\WINNT\system32\musirc4.72.exe
Schedules itself to execute remotely created files.
Opens a connection to a specified Web site.
Connects to a specific IRC channel on a specific IRC server to receive remote instructions, such as:
- ntscan: Performs the scan of a specific computer with weak administrator passwords and copies itself to these computers.
- sysinfo: Retrieves the infected computer's information, such as CPU speed, memory, and so on.
Automatic removal: Use RegRun Startup Optimizer to remove it from startup.
musirc4.72.exe | Malware |
musirc4.72.exe | Dangerous |
musirc4.72.exe | High Risk |
Spreads itself to other systems on the same network.
Allows unauthorized remote execution of commands on an infected computer.
Adds the value: "MusIRC (irc.music.com) client"="musirc4.72.exe"
to the registry keys:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices
Attempts to authenticate itself to randomly generated IP addresses.
Copies itself to the following remote locations when a successful connection is made:
\ADMIN$\system32\musirc4.72.exe
\C$\WINNT\system32\musirc4.72.exe
Schedules itself to execute remotely created files.
Opens a connection to a specified Web site.
Connects to a specific IRC channel on a specific IRC server to receive remote instructions, such as:
- ntscan: Performs the scan of a specific computer with weak administrator passwords and copies itself to these computers.
- sysinfo: Retrieves the infected computer's information, such as CPU speed, memory, and so on.
Automatic removal: Use RegRun Startup Optimizer to remove it from startup.
Dmitry Sokolov:
I created UnHackMe in 2006 to fix the problem that antivioruses did not fix: detecting rootkits.
Since that time I work every day to fix the issues that antiviruses cannot.
If your antivirus have not helped you solve the problem, you should try UnHackMe.
We are a small company and you can ask me directly, if you have any questions.