Home Malware Programs Trojans Win32/Alureon.EC

Win32/Alureon.EC

Posted: September 2, 2011

Win32/Alureon.EC is a data-stealing Trojan that allows attackers to intercept incoming and outgoing Internet traffic in order to collect personal information such as usernames, passwords, credit card data, etc. Win32/Alureon.EC may also enable attackers to forward malicious data to the affected computer system. Win32/Alureon.EC may change DNS settings on the host computer to enable the attacker to execute these tasks. Therefore, it may be necessary to reconfigure DNS settings after Win32/Alureon.EC is deleted from the infected PC. Remove Win32/Alureon.EC from the corrupted machine by using a reputable malware removal tool.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%Documents and Settings%\[UserName]\Start Menu\ Scan.lnk File name: %Documents and Settings%\[UserName]\Start Menu\ Scan.lnk
File type: Shortcut
Mime Type: unknown/lnk
%Program Files%\Protection Center\protext.dll File name: %Program Files%\Protection Center\protext.dll
File type: Dynamic link library
Mime Type: unknown/dll

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{CLSID Path}HKEY_CLASSES_ROOT\CLSID\{5E2121EE-0300-11D4-8D3B-444553540000}HKEY..\..\..\..{Subkeys}HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunHKEY_LOCAL_MACHINE \Software \Microsoft \Windows \CurrentVersion \RunServicesOnceHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run 'Protection Center'vHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run 'tmp'HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce 'SelfdelNT'HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon 'Shell' = '%UserProfile%\Application Data\antispy.exe'
Loading...