Home Malware Programs Rootkits Win32: Tiny-AMB

Win32: Tiny-AMB

Posted: October 31, 2011

Threat Metric

Ranking: 12,797
Threat Level: 1/10
Infected PCs: 1,401
First Seen: October 31, 2011
Last Seen: July 14, 2023
OS(es) Affected: Windows

Win32: Tiny-AMB is an extremely dangerous rootkit parasite that may go undetected by many trusted malware detection applications for the PC. Win32: Tiny-AMB is known to cause harm to an infected PC in addition to blocking firewall and PC security functions. Win32: Tiny-AMB will also load at startup of Windows where it has full run of a PC to prevent other applications from running. It is very important that Win32: Tiny-AMB be removed safely with a trusted malware removal tool that is capable of using rootkit removal procedures.

Use SpyHunter to Detect and Remove PC Threats

If you are concerned that malware or PC threats similar to Win32: Tiny-AMB may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.

Download SpyHunter's Malware Scanner*

* See Free Trial offer below. EULA and Privacy/Cookie Policy.

Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



C:\WINDOWS\system32\wscntfy.exe File name: C:\WINDOWS\system32\wscntfy.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
C:\WINDOWS\system32\spoolsv.exe File name: C:\WINDOWS\system32\spoolsv.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
C:\WINDOWS\System32\aswBoot.exe File name: C:\WINDOWS\System32\aswBoot.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe File name: C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
C:\windows\system\hpsysdrv.exe File name: C:\windows\system\hpsysdrv.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%APPDATA%\win32:Tiny-AMB File name: %APPDATA%\win32:Tiny-AMB
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\..\..{Subkeys}HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon: 'Userinit' = '\userinit.exe, %Documents and Settings%\[UserName]\Application Data\win32:Tiny-AMBHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MSIServer @="Service"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Win32\win32:Tiny-AMBHKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall "DisableMonitoring"=dword:00000001

Additional Information

The following URL's were detected:
www.packtrackplus.com
Loading...