Home Malware Programs Trojans Trojan:Win32/SysInvade!gmb

Trojan:Win32/SysInvade!gmb

Posted: June 5, 2014

Threat Metric

Threat Level: 9/10
Infected PCs: 21
First Seen: June 5, 2014
Last Seen: March 7, 2020
OS(es) Affected: Windows


Trojan:Win32/SysInvade!gmb is a dangerous computer Trojan horse that may run without any indication to the computer. Once infected by Trojan:Win32/SysInvade!gmb, a system is then vulnerable to attack from a remote user or hacker. Through Trojan:Win32/SysInvade!gmb a remote hacker may be able to pilfer data stored on the infected computer putting the user at great risk of identity theft or other worse matters. Eliminating this great risk usually requires that Trojan:Win32/SysInvade!gmb be removed through the use of an antispyware program.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%AppData%\p1.exe File name: %AppData%\p1.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%CommonAppData%\. File name: %CommonAppData%\.
Group: Malware file
%LocalAppData%\KB8456137\KB8456137.exe File name: %LocalAppData%\KB8456137\KB8456137.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%UserProfile%\Application Data\[random digits]\[random digits].cfg File name: %UserProfile%\Application Data\[random digits]\[random digits].cfg
Mime Type: unknown/cfg
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKEY_CURRENT_USER\Software\Classes\\DefaultIcon "(Default)" = '%1'HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "SD2014" = "%AppData%\\.exe"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\KB8456137 = "%LocalAppData%\KB8456137\KB8456137.exe"HKEY_CLASSES_ROOT\CLSID\{750fdf0e-2a26-11d1-a3ea-080036587f03}\InProcServer32 "(Default)" = "\.dll"HKEY..\..\..\..{Subkeys}HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\[random]
Loading...