Home Malware Programs Rootkits Win32: Tiny-AMB

Win32: Tiny-AMB

Posted: October 31, 2011

Threat Metric

Threat Level: 1/10
Infected PCs: 1,401
First Seen: October 31, 2011
Last Seen: July 14, 2023
OS(es) Affected: Windows

Win32: Tiny-AMB is an extremely dangerous rootkit parasite that may go undetected by many trusted malware detection applications for the PC. Win32: Tiny-AMB is known to cause harm to an infected PC in addition to blocking firewall and PC security functions. Win32: Tiny-AMB will also load at startup of Windows where it has full run of a PC to prevent other applications from running. It is very important that Win32: Tiny-AMB be removed safely with a trusted malware removal tool that is capable of using rootkit removal procedures.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



C:\WINDOWS\system32\wscntfy.exe File name: C:\WINDOWS\system32\wscntfy.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
C:\WINDOWS\system32\spoolsv.exe File name: C:\WINDOWS\system32\spoolsv.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
C:\WINDOWS\System32\aswBoot.exe File name: C:\WINDOWS\System32\aswBoot.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe File name: C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
C:\windows\system\hpsysdrv.exe File name: C:\windows\system\hpsysdrv.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%APPDATA%\win32:Tiny-AMB File name: %APPDATA%\win32:Tiny-AMB
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\..\..{Subkeys}HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon: 'Userinit' = '\userinit.exe, %Documents and Settings%\[UserName]\Application Data\win32:Tiny-AMBHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MSIServer @="Service"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Win32\win32:Tiny-AMBHKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall "DisableMonitoring"=dword:00000001

Additional Information

The following URL's were detected:
www.packtrackplus.com
Loading...