Base de Datos de Amenazas Gusanos Worm.Win32.Carrier.gv

Worm.Win32.Carrier.gv

Por ZulaZuza en Gusanos

Cuadro de Mando de Amenazas

Popularity Rank: 23,057
Nivel de amenaza: 60 % (Medio)
Computadoras infectadas: 1,326
Visto por primera vez: July 24, 2009
Ultima vez visto: March 20, 2026
SO(s) afectados: Windows


El Worm.Win32.Carrier.gv es un gusano de red conciente que se propaga utilizando las redes existentes. El Worm.Win32.Carrier.gv a menudo solicita otros archivos malignos en Internet para descargarlos en el sistema atacado. El Worm.Win32.Carrier.gv puede enviar mensajes de correo electrónico con un motor de cliente SMTP incorporado que envía emails a un servidor de correo destinatario. El Worm.Win32.Carrier.gv debe ser eliminado inmediatamente usando un software contra malware eficaz.

Alias

15 proveedores de seguridad marcaron este archivo como malicioso.

Antivirus Vendor Detección
AVG Generic25.CJCV
Fortinet W32/BDoor.CEP!tr.bdr
AhnLab-V3 Trojan/Win32.ADH
AntiVir BDS/Bifrose.A.394
Kaspersky Trojan.Win32.Midgare.bbsz
ClamAV Trojan.Midgare-167
CAT-QuickHeal Trojan.Midgare.bbsz
Panda Trj/Thed.M
AVG Generic5_c.BUVP
TrendMicro TROJ_SPNR.11I612
F-Secure Gen:Variant.Barys.1607
eSafe Win32.GenVariant.Kaz
McAfee BackDoor-FACW!FEA05B1E642B
AVG Generic5_c.AUMF
AhnLab-V3 Backdoor/Win32.Buzy

SpyHunter detecta y elimina Worm.Win32.Carrier.gv

Detalles del Sistema de Archivos

Worm.Win32.Carrier.gv puede crear los siguientes archivos:
# Nombre MD5 Detecciones
1. KEYGEN.EXE c78823c750512ab280b62ec17ee2173a 571
2. wuauclt.exe 2e2d0c602a60fba0ee1f3c68d2532237 76
3. csrs.exe a94dc5a0361bb54f4c40abf404441379 34
4. update.exe 4b63963bcc580f48f5a40bda656ebd51 6
5. winsrvcn.exe f75a8c506ed70d465e15065146843385 4
6. server.exe 1bf5e02e439c6cf09c220d5710b46ad5 4
7. csrss.exe b6c30f087bb3cbc38c7abb3e2ca4eaf2 2
8. alvsvpd.exe 61e2355a9bc4d852c06571b51f084448 2
9. camfrog.exe c8b0f1482d5026134d4be7f3b906b21f 1
10. system32.exe e83b9b6a0f906ad6564afc890ea5c6bd 1
11. file[1].exe 9b1b8011f18ac6b95c87cc5c115514e7 0
12. ffx.exe 905d88c67659fe04a35ec2c0f86c4ed0 0
13. winsystem.exe 4920b9bcc50cac48ce4cb3f4ce4c527e 0
14. svchost.exe 624f45f8ef3f192e8eb09a529fe0e3fe 0
15. spoolsv.exe c665a55e56966c44171d9c8900fbb529 0
16. ccdrive32.exe 39f2c3805d88cf76c5d79c54c1e37349 0
17. rundll32.exe 8d08b75195561ed02caa6f0abb3b4fd8 0
18. msn.exe 2afb4ee104bc1d0be383845845a9b511 0
19. H2sfasH.exe 31eb4ff720d93075a2fcbb203c590ff2 0
20. msvmcls64.exe ae7fa2384864f34947ac24f45ca9e4bf 0
21. win23.exe f2e2909a1aa1ba25357768061979b621 0
22. file.exe d948009c57aa4ef2d0e1944b561c12ba 0
Más Archivos

Detalles del Registro

Worm.Win32.Carrier.gv puede crear la siguiente entrada o entradas de registro:
Regexp file mask
%ALLUSERSPROFILE%\cachemgr.exe
%SystemDrive%\Setup\CacheMgr.exe
%TEMP%\XX--XX--XX.txt

Reporte de análisis

Información general

Family Name: Backdoor.Bifrose
Signature status: No Signature

Known Samples

MD5: 8b6450f6d43a9e848f6d33b06b3411c3
SHA1: 1f677ad0abcfe8f0c4c694c7732c7f95a94d08f6
SHA256: 8150596BCBBE51058C6988D0278A1AB14DC14F02700639E771D420726A81BA9A
Tamaño del archivo: 3.17 MB, 3166208 bytes
MD5: ba5de8b0ccd90eab0ab08ca8faa5b697
SHA1: 93ce801c072fa3cabe89cbe99fe335b4d62e3002
SHA256: 584A45DCA84D00B14EDD873BF269AE72A66044C13134E146951B16A5CCD12456
Tamaño del archivo: 5.02 MB, 5015040 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have relocations information
  • File doesn't have security information
  • File has exports table
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
Show More
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Nombre Valor
Comments
  • Modified by an unpaid evaluation copy of Resource Tuner 2 (www.heaventools.com)
  • Modified by an unpaid evaluation copy of Resource Tuner 2. http://www.heaventools.com
Company Name Hanbitsoft corp.
File Description
  • Tantra AutoUpdater
  • Tantra Client
File Version
  • 6, 9, 0, 6
  • 2.1.0.3
Internal Name HTLaunch
Legal Copyright
  • Copyright (c) - 2003 Hanbitsoft corp.
  • khanakat.azurewebsites.net
Original Filename HTLaunch.exe
Product Name Tantra Client
Product Version
  • 2.1.0.3
  • 1, 0, 0, 1

File Traits

  • 00 section
  • 2+ executable sections
  • HighEntropy
  • RT
  • VirtualQueryEx
  • x86

Block Information

Total Blocks: 6,482
Potentially Malicious Blocks: 1
Whitelisted Blocks: 6,440
Unknown Blocks: 41

Visual Map

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
... Data truncated
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • BadJoke.LMG
  • Banker.RF
  • Casbaneiro.A
  • Delf.GFA
  • Filecoder.RR
Show More
  • Installmonstr.EC
  • MSIL.Agent.FG

Windows API Usage

Category API
Other Suspicious
  • SetWindowsHookEx
User Data Access
  • GetComputerName
  • GetUserName
  • GetUserObjectInformation

Tendencias

Mas Visto

Cargando...