sysz.exe - Dangerous
sysz.exe
Manual removal instructions:
Antivirus Report of sysz.exe:
sysz.exe
Backdoor.IRC.Aladinz.P is a backdoor Trojan horse that uses malicious mIRC scripts.
This Trojan allows an attacker to access your computer.
By default the Trojan listens on TCP port 2688.
Creates the following files in the %System%\SYSTEMCONFIG33 folder:
4w4y.txt; cu.dat (detected as Backdoor.IRC.Aladinz.P); remote.ini; users.txt; w1n.dll; win32.exe (detected as Backdoor.SDBot.Gen)
Creates some files in the %System%\SYSTEMCONFIG33 folder with the files attribute set to Hidden.
Creates these subfolders: logs; sounds
Adds the values:
"Internat"="%System%\SYSTEMCONFIG33\systray.exe"
"SystemTray"="SysTray.Exe"
"SYSTEMZ Patch"="SYSZ.exe"
to the registry key: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
Modifies the value: "UninstallString"=""%System%\SYSTEMCONFIG33\systray.exe" -uninstall"
in the registry key: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\mIRC
Connects to a remote IRC server.
Allows a remote attacker to control the computer.
The functions available to the attacker include:
- Retrieving information about the computer
- Stopping and restarting the Trojan
- Downloading and running the files
- Scanning hosts for vulnerabilities
sysz.exe | Malware |
sysz.exe | Dangerous |
sysz.exe | High Risk |
This Trojan allows an attacker to access your computer.
By default the Trojan listens on TCP port 2688.
Creates the following files in the %System%\SYSTEMCONFIG33 folder:
4w4y.txt; cu.dat (detected as Backdoor.IRC.Aladinz.P); remote.ini; users.txt; w1n.dll; win32.exe (detected as Backdoor.SDBot.Gen)
Creates some files in the %System%\SYSTEMCONFIG33 folder with the files attribute set to Hidden.
Creates these subfolders: logs; sounds
Adds the values:
"Internat"="%System%\SYSTEMCONFIG33\systray.exe"
"SystemTray"="SysTray.Exe"
"SYSTEMZ Patch"="SYSZ.exe"
to the registry key: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
Modifies the value: "UninstallString"=""%System%\SYSTEMCONFIG33\systray.exe" -uninstall"
in the registry key: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\mIRC
Connects to a remote IRC server.
Allows a remote attacker to control the computer.
The functions available to the attacker include:
- Retrieving information about the computer
- Stopping and restarting the Trojan
- Downloading and running the files
- Scanning hosts for vulnerabilities
Dmitry Sokolov:
I created UnHackMe in 2006 to fix the problem that antivioruses did not fix: detecting rootkits.
Since that time I work every day to fix the issues that antiviruses cannot.
If your antivirus have not helped you solve the problem, you should try UnHackMe.
We are a small company and you can ask me directly, if you have any questions.