Home Malware Programs Trojans Trojan.win32.genome.jdqq

Trojan.win32.genome.jdqq

Posted: September 16, 2011

Threat Metric

Threat Level: 9/10
Infected PCs: 7,439
First Seen: September 16, 2011
Last Seen: November 27, 2024
OS(es) Affected: Windows

Trojan.win32.genome.jdqq is a damaging Trojan that secretly penetrates into a targeted computer system via network vulnerabilities. Trojan.win32.genome.jdqq usually comes bundled with rogue anti-spyware applications. Once Trojan.win32.genome.jdqq is installed on a compromised machine, it generates itself to run automatically every time you start your Windows. Trojan.win32.genome.jdqq runs in the background and slows down your PC system by consuming a large amount of computer system resources. Trojan.win32.genome.jdqq also enables attackers to gain remote access to the infected computer. Trojan.win32.genome.jdqq can gather and forward all confidential information to remote attackers.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%SYSTEMDRIVE%\Users\<username>\AppData\Roaming\Microsoft\Notification de cadeaux MSN\lsnfier.exe File name: lsnfier.exe
Size: 135.68 KB (135680 bytes)
MD5: bc9c9be7bb74d629362608ace470e7da
Detection count: 5,642
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\Users\<username>\AppData\Roaming\Microsoft\Notification de cadeaux MSN\lsnfier.exe
Group: Malware file
Last Updated: November 27, 2024
%PROGRAM_FILES%\Trojan.win32.genome.jdqq\Trojan.win32.genome.jdqq File name: %PROGRAM_FILES%\Trojan.win32.genome.jdqq\Trojan.win32.genome.jdqq
Mime Type: unknown/jdqq
Group: Malware file
%System%\bazooka3\osenxpsuite2005.ocx File name: %System%\bazooka3\osenxpsuite2005.ocx
Mime Type: unknown/ocx
Group: Malware file
%System%\bazooka3\Bazooka.exe File name: %System%\bazooka3\Bazooka.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%System%\bazooka3\COMDLG32.OCX File name: %System%\bazooka3\COMDLG32.OCX
Mime Type: unknown/OCX
Group: Malware file
%System%\bazooka3\[4 RANDOM CHARACTERS].txt File name: %System%\bazooka3\[4 RANDOM CHARACTERS].txt
Mime Type: unknown/txt
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{CLSID Path}HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{006F83CE-EF09-451B-9356-C75AD00697ED}\Required CategoriesHKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{006F83CE-EF09-451B-9356-C75AD00697ED}\MiscStatusHKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{006F83CE-EF09-451B-9356-C75AD00697ED}\MiscStatus\1HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{006F83CE-EF09-451B-9356-C75AD00697ED}\MiscStatus\1 (Default) = "229777"HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{006F83CE-EF09-451B-9356-C75AD00697ED}\VERSION (Default) = "1.0"HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{006F83CE-EF09-451B-9356-C75AD00697ED}\TypeLib (Default) = "{201DDD61-2287-4F32-BD90-95CDD6EE522F}"HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{006F83CE-EF09-451B-9356-C75AD00697ED}\ToolboxBitmap32HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{006F83CE-EF09-451B-9356-C75AD00697ED}\Implemented Categories\{0DE86A53-2BAA-11CF-A229-00AA003D7352}HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{006F83CE-EF09-451B-9356-C75AD00697ED}\InprocServer32HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{006F83CE-EF09-451B-9356-C75AD00697ED}HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{006F83CE-EF09-451B-9356-C75AD00697ED}\ControlHKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{006F83CE-EF09-451B-9356-C75AD00697ED}\Implemented CategoriesHKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{006F83CE-EF09-451B-9356-C75AD00697ED}\Implemented Categories\{0DE86A52-2BAA-11CF-A229-00AA003D7352}HKEY..\..\..\..{Subkeys}HKEY_LOCAL_MACHINE\Software\ Trojan.win32.genome.jdqq
Loading...