Threat Database Backdoors Backdoor.Win32.Rbot.acky

Backdoor.Win32.Rbot.acky

By ZulaZuza in Backdoors

Backdoor.Win32.Rbot.acky is a dangerous Backdoor trojan infection that uses rootkit methods to open a backdoor for outside attackers on the corrupted computer system. Backdoor.Win32.Rbot.acky can make changes to various Windows system applications to prevent users from eliminating the threat and accomplish virus scan. Backdoor.Win32.Rbot.acky can block victims to access anti-virus websites and affect both local and network computers. Backdoor.Win32.Rbot.acky increases the instability of your system and can automatically illustrate or download advertisements to a computer after the adware application is installed.

File System Details

Backdoor.Win32.Rbot.acky may create the following file(s):
# File Name Detections
1. %PROGRAM_FILES%\Backdoor.Win32.Rbot.acky
2. C:\Documents and Settings\\Start Menu\Backdoor.Win32.Rbot.acky\ C:\Documents and Settings\\Backdoor.Win32.Rbot.acky\
3. %FontsDir%\uinstall_/exe

Registry Details

Backdoor.Win32.Rbot.acky may create the following registry entry or registry entries:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MRT
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WINDOWS_HOSTS_CONTROLLER\0000
DoNotAllowXPSP2 = 0x00000001
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control]
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Windows Hosts Controller\Enum
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MRT]DontReportInfectionInformation = 0x00000001
SFCScan = 0x00000000
HKEY_LOCAL_MACHINE\Software\Backdoor.Win32.Rbot.acky
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Windows File Protection
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Windows Hosts Controller\Enum
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WINDOWS_HOSTS_CONTROLLER
SFCDisable = 0xFFFFFF9D
WaitToKillServiceT = "5000"

Trending

Most Viewed

Loading...