usbewt.sys - Dangerous

usbewt.sys

Manual removal instructions:

Antivirus Report of usbewt.sys:
usbewt.sys Malware
usbewt.sysDangerous
usbewt.sysHigh Risk
usbewt.sys
We suggest you to remove usbewt.sys from your computer as soon as possible.
Usbewt.sys is Trojan/Backdoor.
Kill the file usbewt.sys and remove usbewt.sys from Windows startup.

File: setup.exe(C:\sand-box\setup.exe)

Classification:
Antivirus Version Last Update Result
Avast 4.8.1335.0 2009.07.18 -
AVG 8.5.0.387 2009.07.18 -
BitDefender 7.2 2009.07.18 -
Comodo 1696 2009.07.19 -
DrWeb 5.0.0.12182 2009.07.18 -
F-Secure 8.0.14470.0 2009.07.18 -
Kaspersky 7.0.0.125 2009.07.19 -
Microsoft 1.4803 2009.07.19 Trojan:Win32/Wimpixo.gen!A
NOD32 4257 2009.07.18 -
Symantec 1.4.4.12 2009.07.18 Infostealer

Additional information
File size: 77824 bytes
MD5 : 614a619568148584dcefe7f0f79eadb4
SHA1 : 0f8f53266d8d9a3b1bae40cd8f71290de9acba60

Installation
When the program is executed, it creates the following registry subkeys and values:

----------------------------------
Keys deleted:1
----------------------------------
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew

----------------------------------
Keys added:10
----------------------------------
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Extensions
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_6TO4
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_6TO4\0000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_USBEWT
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_USBEWT\0000
HKLM\SYSTEM\CurrentControlSet\Services\6to4
HKLM\SYSTEM\CurrentControlSet\Services\6to4\Parameters
HKLM\SYSTEM\CurrentControlSet\Services\6to4\Security
HKLM\SYSTEM\CurrentControlSet\Services\usbewt
HKLM\SYSTEM\CurrentControlSet\Services\usbewt\Security

----------------------------------
Values deleted:0
----------------------------------

----------------------------------
Values added:32
----------------------------------
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Extensions\.ini: "notepad.exe ^.ini"
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Extensions\.txt: "notepad.exe ^.txt"
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Extensions\.wtx: "notepad.exe ^.wtx"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_6TO4\0000\Service: "6to4"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_6TO4\0000\Legacy: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_6TO4\0000\ConfigFlags: 0x00000000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_6TO4\0000\Class: "LegacyDriver"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_6TO4\0000\ClassGUID: "{8ECC055D-047F-11D1-A537-0000F8753ED1}"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_6TO4\0000\DeviceDesc: "6to4"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_6TO4\NextInstance: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_USBEWT\0000\Service: "usbewt"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_USBEWT\0000\Legacy: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_USBEWT\0000\ConfigFlags: 0x00000000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_USBEWT\0000\Class: "LegacyDriver"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_USBEWT\0000\ClassGUID: "{8ECC055D-047F-11D1-A537-0000F8753ED1}"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_USBEWT\0000\DeviceDesc: "usbewt"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_USBEWT\NextInstance: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Services\6to4\Security\Security: 01 00 14 80 90 00 00 00 9C 00 00 00 14 00 00 00 30 00 00 00 02 00 1C 00 01 00 00 00 02 80 14 00 FF 01 0F 00 01 01 00 00 00 00 00 01 00 00 00 00 02 00 60 00 04 00 00 00 00 00 14 00 FD 01 02 00 01 01 00 00 00 00 00 05 12 00 00 00 00 00 18 00 FF 01 0F 00 01 02 00 00 00 00 00 05 20 00 00 00 20 02 00 00 00 00 14 00 8D 01 02 00 01 01 00 00 00 00 00 05 0B 00 00 00 00 00 18 00 FD 01 02 00 01 02 00 00 00 00 00 05 20 00 00 00 23 02 00 00 01 01 00 00 00 00 00 05 12 00 00 00 01 01 00 00 00 00 00 05 12 00 00 00
HKLM\SYSTEM\CurrentControlSet\Services\6to4\Parameters\ServiceDll: "C:\WINDOWS\system32\6to4v32.dll"
HKLM\SYSTEM\CurrentControlSet\Services\6to4\Type: 0x00000120
HKLM\SYSTEM\CurrentControlSet\Services\6to4\Start: 0x00000002
HKLM\SYSTEM\CurrentControlSet\Services\6to4\ErrorControl: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Services\6to4\ImagePath: "%SystemRoot%\System32\svchost.exe -k netsvcs"
HKLM\SYSTEM\CurrentControlSet\Services\6to4\DisplayName: "6to4"
HKLM\SYSTEM\CurrentControlSet\Services\6to4\ObjectName: "LocalSystem"
HKLM\SYSTEM\CurrentControlSet\Services\usbewt\Security\Security: 01 00 14 80 90 00 00 00 9C 00 00 00 14 00 00 00 30 00 00 00 02 00 1C 00 01 00 00 00 02 80 14 00 FF 01 0F 00 01 01 00 00 00 00 00 01 00 00 00 00 02 00 60 00 04 00 00 00 00 00 14 00 FD 01 02 00 01 01 00 00 00 00 00 05 12 00 00 00 00 00 18 00 FF 01 0F 00 01 02 00 00 00 00 00 05 20 00 00 00 20 02 00 00 00 00 14 00 8D 01 02 00 01 01 00 00 00 00 00 05 0B 00 00 00 00 00 18 00 FD 01 02 00 01 02 00 00 00 00 00 05 20 00 00 00 23 02 00 00 01 01 00 00 00 00 00 05 12 00 00 00 01 01 00 00 00 00 00 05 12 00 00 00
HKLM\SYSTEM\CurrentControlSet\Services\usbewt\Type: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Services\usbewt\Start: 0x00000003
HKLM\SYSTEM\CurrentControlSet\Services\usbewt\ErrorControl: 0x00000000
HKLM\SYSTEM\CurrentControlSet\Services\usbewt\ImagePath: "\??\C:\WINDOWS\system32\usbewt.sys"
HKLM\SYSTEM\CurrentControlSet\Services\usbewt\DisplayName: "usbewt"
HKLM\SYSTEM\CurrentControlSet\Services\usbewt\Description: "usbewt"

----------------------------------
Values modified:0
----------------------------------

----------------------------------
Files added:2
----------------------------------
C:\WINDOWS\system32\6to4v32.dll
C:\WINDOWS\system32\usbewt.sys

----------------------------------
Files deleted:1
----------------------------------
C:\sand-box\setup.exe

----------------------------------
Files [attributes?] modified:0
----------------------------------

----------------------------------
Folders added:0
----------------------------------

----------------------------------
Folders deleted:0
----------------------------------

----------------------------------
Total changes:46
----------------------------------

-------------------------------------------------------------------------------------
Detected by RegRun Reanimator:

Item Name: 6to4
Author: Unknown
Related File: C:\WINDOWS\system32\6to4v32.dll
Type: Svchost DLLs

After first reboot detected by RegRun Reanimator:

Item Name: usbewt
Author:
Related File: \??\C:\WINDOWS\system32\usbewt.sys
Type: Services detected by Partizan

Removal Results: Success
Number of reboot: 2
-------------------------------------------------------------------------------------

Recommended software:
UnHackMe anti-rootkit and anti-malware
http://www.unhackme.com
RegRun Security Suite (Good choice for removal and protection)

Remove usbewt.sys now!

Dmitry Sokolov:

I created UnHackMe in 2006 to fix the problem that antivioruses did not fix: detecting rootkits.

Since that time I work every day to fix the issues that antiviruses cannot.

If your antivirus have not helped you solve the problem, you should try UnHackMe.

We are a small company and you can ask me directly, if you have any questions.

Testimonials

You can read UnHackMe testimonials here.