Home Malware Programs Backdoors Trojan.Patched!sd5

Trojan.Patched!sd5

Posted: June 30, 2011

Trojan.Patched!sd5 is a threat that's created by worms that alter .dll files. The occurrence of Trojan.Patched!sd5 always indicates the presence of additional Trojans, viruses, worms and other threats that may cause a wide range of attacks on your PC and a variety of negative symptoms. Trojan.Patched!sd5 and related threats may alter your proxy server settings, launch themselves automatically, delete information that's related to certain programs, open ports or make contact with remote entities. The existence of Trojan.Patched!sd5 on your PC may lead to remote attacks and other negative behavior that should be avoided by removing Trojan.Patched!sd5 with suitable anti-virus software.

The Numerous Allies and Names of Trojan.Patched!sd5

Trojan.Patched!sd5 can often be seen working next to many other types of malicious programs that are designed to compromise your PC security or perform other harmful actions. A few of Trojan.Patched!sd5's major cohorts include IM-Worm.Win32.Sohanad, MonitoringTool:Win32/Ardamax, Trojan.Win32.AutoRun and VirTool.INF.Autorun. This range of Trojan.Patched!sd5 allies includes viruses that can infect other files, worms that can spread via networks or removable drives and other Trojans.

Trojan.Patched!sd5 also has several names of its own, such as Virus:Win32/Mariofev.A, Trojan.Win32.Patched.m, Trojan.Win32.Patched.dr, Patched User32, New Win32, Trojan.Win32.Patched.bb and Troj/User32Hk-A.

Most Trojan.Patched!sd5 infections are created by Worm:Win32/Mariofev.A worms. The Worm:Win32/Mariofev.A worm is capable of copying itself to new computers by way of networks and shared storage devices and will create Trojan.Patched!sd5 and other infections by altering native .dll files.

Like many worms, the Worm:Win32/Mariofev.A worm that creates Trojan.Patched!sd5 can also exploit Autorun.inf vulnerabilities to install itself without your permission. As long as a new computer accesses the drive or folder where Worm:Win32/Mariofev.A infection exists, Worm:Win32/Mariofev.A can install itself. Other than alarms from your security software, there may be no signs of Worm:Win32/Mariofev.A or Trojan.Patched!sd5 attackers on your PC.

The Other Vulnerabilities That Trojan.Patched!sd5 Widens Into Yawning Gaps

Trojan.Patched!sd5 and related threats can attack your security and other aspects of your PC in a multitude of ways:

  • Registry entries may be deleted to prevent you from accessing certain programs. Although the programs themselves may be left unharmed by this attack, you will be unable to use them until the relevant entries have been restored to your Registry.
  • Trojan.Patched!sd5 and other malicious programs may run whenever Windows starts, often by using an innocent disguise like 'services.exe.'
  • Trojan.Patched!sd5 and related threats may use the Registry to change your proxy server settings. Proxy server settings can be exploited to hijack your web browser and force you to visit malicious websites.
  • Trojan.Patched!sd5 may contain or install spyware that attempts to steal passwords and other information that could compromise your identity and online accounts.

Like all Trojans, where Trojan.Patched!sd5 exists there exists the risk of other harmful programs being installed or for remote criminals to attack and control your PC. These serious threats should be attended to by using an advanced and up-to-date security program to find and remove Trojan.Patched!sd5 and any worms and other threats. Manual deletion for worms and similar infections is an impractical solution for everyone, except the most patient of PC experts.

File System Modifications

  • The following files were created in the system:
    # File Name
    1 %Windir%\services.exe
    2 c:\autorun.inf
    3 c:\pukka.exe
    4 c:\URL List.txt.exe

Registry Modifications

  • The following newly produced Registry Values are:
    HKEY..\..\..\..{Subkeys}[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings]HKEY..\..\..\..{RegistryKeys}Microsoft Windows Update Client = "%Windir%\services.exe"ProxyEnabled = "FALSE"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\..{RunKeys}[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
Loading...