wcctgj4zcxhf.dll - Dangerous

wcctgj4zcxhf.dll

Manual removal instructions:

Antivirus Report of wcctgj4zcxhf.dll:
wcctgj4zcxhf.dll Malware
wcctgj4zcxhf.dllDangerous
wcctgj4zcxhf.dllHigh Risk
wcctgj4zcxhf.dll
We suggest you to remove emHnPuBAaF7XjuXBbdxSg.dll from your computer as soon as possible.
EmHnPuBAaF7XjuXBbdxSg.dll is Trojan/Backdoor.
Kill the file emHnPuBAaF7XjuXBbdxSg.dll and remove emHnPuBAaF7XjuXBbdxSg.dll from Windows startup.

File: xx.exe
-------------------------------------------------------------------------------------
Classification:
Code:
Antivirus Version Last Update Result
Avast 4.8.1335.0 2009.08.17 Win32:Small-MTB
AVG 8.5.0.406 2009.08.17 Downloader.Generic8.BHPX
BitDefender 7.2 2009.08.17 -
Comodo 1995 2009.08.17 TrojWare.Win32.TrojanDownloader.Pleh.bm
DrWeb 5.0.0.12182 2009.08.17 Trojan.DownLoad.43080
F-Secure 8.0.14470.0 2009.08.17 Trojan-Downloader.Win32.Pleh.bm
Kaspersky 7.0.0.125 2009.08.17 Trojan-Downloader.Win32.Pleh.bm
Microsoft 1.4903 2009.08.16 Backdoor:Win32/Farfli.I
NOD32 4340 2009.08.16 a variant of Win32/TrojanDownloader.Agent.OXU
Symantec 1.4.4.12 2009.08.17 Hacktool.Rootkit

Additional information
File size: 29184 bytes
MD5 : e80f8383542a795629b34c3b2cc9cccc
SHA1 : 068af3c9ff87761266ebbf8ac3f07091b82230e2
-------------------------------------------------------------------------------------
Installation
When the program is executed, it creates the following registry subkeys and values:

----------------------------------
Keys added:14
----------------------------------
HKLM\SOFTWARE\Classes\CLSID\{427E02E6-39DB-4424-A49C-7553CD1331F5}
HKLM\SOFTWARE\Classes\CLSID\{427E02E6-39DB-4424-A49C-7553CD1331F5}\InprocServer32
HKLM\SOFTWARE\Classes\CLSID\{69B265A2-A172-4D27-BDF1-917E6D8B1DCC}
HKLM\SOFTWARE\Classes\CLSID\{69B265A2-A172-4D27-BDF1-917E6D8B1DCC}\InprocServer32
HKLM\SOFTWARE\Classes\CLSID\{9AD1DE62-196C-4C01-9A2F-0BEDEF727C59}
HKLM\SOFTWARE\Classes\CLSID\{9AD1DE62-196C-4C01-9A2F-0BEDEF727C59}\InprocServer32
HKLM\SOFTWARE\Classes\CLSID\{E3531A16-FFEA-416F-82DF-32FEDE02EABF}
HKLM\SOFTWARE\Classes\CLSID\{E3531A16-FFEA-416F-82DF-32FEDE02EABF}\InprocServer32
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe
HKLM\SOFTWARE\Microsoft\DownloadManager
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ZX
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ZX\0000
HKLM\SYSTEM\CurrentControlSet\Services\zx
HKLM\SYSTEM\CurrentControlSet\Services\zx\Security

----------------------------------
Values deleted:2
----------------------------------
HKLM\SOFTWARE\Classes\Microsoft.XMLHTTP\CLSID\: "{ED8C108E-4349-11D2-91A4-00C04F7969E8}"
HKLM\SOFTWARE\Classes\Microsoft.XMLHTTP\CurVer\: "Microsoft.XMLHTTP.1.0"

----------------------------------
Values added:26
----------------------------------
HKLM\SOFTWARE\Classes\CLSID\{427E02E6-39DB-4424-A49C-7553CD1331F5}\InprocServer32\: "C:\WINDOWS\system32\WcCtgJ4zcxHF.dll"
HKLM\SOFTWARE\Classes\CLSID\{427E02E6-39DB-4424-A49C-7553CD1331F5}\InprocServer32\ThreadingModel: "Apartment"
HKLM\SOFTWARE\Classes\CLSID\{69B265A2-A172-4D27-BDF1-917E6D8B1DCC}\InprocServer32\: "C:\WINDOWS\fonts\jUxfqJDwmfQEHcy2.fon"
HKLM\SOFTWARE\Classes\CLSID\{69B265A2-A172-4D27-BDF1-917E6D8B1DCC}\InprocServer32\ThreadingModel: "Apartment"
HKLM\SOFTWARE\Classes\CLSID\{9AD1DE62-196C-4C01-9A2F-0BEDEF727C59}\InprocServer32\: "C:\WINDOWS\system32\mFr9FPruEFZ9VNdrveJunw3.dll"
HKLM\SOFTWARE\Classes\CLSID\{9AD1DE62-196C-4C01-9A2F-0BEDEF727C59}\InprocServer32\ThreadingModel: "Apartment"
HKLM\SOFTWARE\Classes\CLSID\{E3531A16-FFEA-416F-82DF-32FEDE02EABF}\InprocServer32\: "C:\WINDOWS\system32\emHnPuBAaF7XjuXBbdxSg.dll"
HKLM\SOFTWARE\Classes\CLSID\{E3531A16-FFEA-416F-82DF-32FEDE02EABF}\InprocServer32\ThreadingModel: "Apartment"
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{E3531A16-FFEA-416F-82DF-32FEDE02EABF}: ""
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{69B265A2-A172-4D27-BDF1-917E6D8B1DCC}: ""
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{9AD1DE62-196C-4C01-9A2F-0BEDEF727C59}: ""
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{427E02E6-39DB-4424-A49C-7553CD1331F5}: ""
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe\Debugger: "services.exe"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ZX\0000\Service: "zx"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ZX\0000\Legacy: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ZX\0000\ConfigFlags: 0x00000000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ZX\0000\Class: "LegacyDriver"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ZX\0000\ClassGUID: "{8ECC055D-047F-11D1-A537-0000F8753ED1}"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ZX\0000\DeviceDesc: "zx"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ZX\NextInstance: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Services\zx\Security\Security: 01 00 14 80 90 00 00 00 9C 00 00 00 14 00 00 00 30 00 00 00 02 00 1C 00 01 00 00 00 02 80 14 00 FF 01 0F 00 01 01 00 00 00 00 00 01 00 00 00 00 02 00 60 00 04 00 00 00 00 00 14 00 FD 01 02 00 01 01 00 00 00 00 00 05 12 00 00 00 00 00 18 00 FF 01 0F 00 01 02 00 00 00 00 00 05 20 00 00 00 20 02 00 00 00 00 14 00 8D 01 02 00 01 01 00 00 00 00 00 05 0B 00 00 00 00 00 18 00 FD 01 02 00 01 02 00 00 00 00 00 05 20 00 00 00 23 02 00 00 01 01 00 00 00 00 00 05 12 00 00 00 01 01 00 00 00 00 00 05 12 00 00 00
HKLM\SYSTEM\CurrentControlSet\Services\zx\Type: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Services\zx\Start: 0x00000003
HKLM\SYSTEM\CurrentControlSet\Services\zx\ErrorControl: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Services\zx\ImagePath: "\??\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\~93ab.tmp"
HKLM\SYSTEM\CurrentControlSet\Services\zx\DisplayName: "zx"

----------------------------------
Values modified:0
----------------------------------

----------------------------------
Files added:12
----------------------------------
C:\Documents and Settings\Administrator\Local Settings\Temp\~17ec0.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\~753a.t
C:\Documents and Settings\Administrator\Local Settings\Temp\~93aa.tmp
C:\WINDOWS\Fonts\CcKKcpwJmND4.Ttf
C:\WINDOWS\Fonts\CSzZ3gVtf.Ttf
C:\WINDOWS\Fonts\jUxfqJDwmfQEHcy2.fon
C:\WINDOWS\Fonts\tHCsj3zT7wpspzWKuBu.Ttf
C:\WINDOWS\Fonts\WD7eC3pJvgmYQYNwrVP.Ttf
C:\WINDOWS\system32\dfc8ac3ed7da.dll
C:\WINDOWS\system32\emHnPuBAaF7XjuXBbdxSg.dll
C:\WINDOWS\system32\mFr9FPruEFZ9VNdrveJunw3.dll
C:\WINDOWS\system32\WcCtgJ4zcxHF.dll

----------------------------------
Files deleted:1
----------------------------------
C:\WINDOWS\system32\verclsid.exe

----------------------------------
Files [attributes?] modified:1
----------------------------------
C:\WINDOWS\system32\comres.dll

----------------------------------
Folders added:0
----------------------------------

----------------------------------
Folders deleted:0
----------------------------------

----------------------------------
Total changes:56
----------------------------------

-------------------------------------------------------------------------------------
Internet activity:
Code:
HTTP GET http://txt.opxxw.com/xx.txt
HTTP GET http://1.dopxk.com/images/1.exe
HTTP GET http://1.dopxk.com/images/2.exe
HTTP GET http://1.dopxk.com/images/3.exe
HTTP GET http://1.dopxk.com/images/4.exe
-------------------------------------------------------------------------------------
Detected by RegRun Reanimator:

Item Name: {E3531A16-FFEA-416F-82DF-32FEDE02EABF}
Author: Unknown
Related File: C:\WINDOWS\system32\emHnPuBAaF7XjuXBbdxSg.dll
Type: Shell Execute Hooks

Item Name: {69B265A2-A172-4D27-BDF1-917E6D8B1DCC}
Author: Unknown
Related File: C:\WINDOWS\fonts\jUxfqJDwmfQEHcy2.fon
Type: Shell Execute Hooks

Item Name: {9AD1DE62-196C-4C01-9A2F-0BEDEF727C59}
Author: Unknown
Related File: C:\WINDOWS\system32\mFr9FPruEFZ9VNdrveJunw3.dll
Type: Shell Execute Hooks

Item Name: {427E02E6-39DB-4424-A49C-7553CD1331F5}
Author: Unknown
Related File: C:\WINDOWS\system32\WcCtgJ4zcxHF.dll
Type: Shell Execute Hooks

Item Name: COMRES.DLL
Author: Unknown
Related File: C:\WINDOWS\SYSTEM32\COMRES.DLL
Type: Infected System Files

Removal Results: Success
Number of reboot: 1
-------------------------------------------------------------------------------------

Recommended software:
UnHackMe anti-rootkit and anti-malware
http://www.unhackme.com
RegRun Security Suite (Good choice for removal and protection)

Remove wcctgj4zcxhf.dll now!

Dmitry Sokolov:

I created UnHackMe in 2006 to fix the problem that antivioruses did not fix: detecting rootkits.

Since that time I work every day to fix the issues that antiviruses cannot.

If your antivirus have not helped you solve the problem, you should try UnHackMe.

We are a small company and you can ask me directly, if you have any questions.

Testimonials

You can read UnHackMe testimonials here.