Threat Database Trojans Trojan.Adload

Trojan.Adload

By CagedTech in Trojans

Threat Scorecard

Ranking: 1,973
Threat Level: 80 % (High)
Infected Computers: 84,134
First Seen: July 24, 2009
Last Seen: September 30, 2023
OS(es) Affected: Windows

Aliases

15 security vendors flagged this file as malicious.

Anti-Virus Software Detection
McAfee-GW-Edition Artemis!3199939B5E62
Comodo UnclassifiedMalware
eTrust-Vet Win32/Gamepass.MSK
AVG Adload_r.KZ
AVG Adload_r.LO
McAfee-GW-Edition Artemis!E88309B81D47
AVG Adload_r.AFY
Kaspersky Trojan-Downloader.Win32.Banload.avql
Sunbelt Trojan.Win32.Generic!BT
Sophos Troj/Virtum-Gen
McAfee Generic Obfuscated.g
Sophos Sus/UnkPack-C
NOD32 Win32/Agent.RAY
AVG Adload_r.LA
Antiy-AVL Trojan/Win32.Banload.gen

File System Details

Trojan.Adload may create the following file(s):
# File Name MD5 Detections
1. dataup.bak 1020874808a7552da63ea3649e1d846c 729
2. svcvmx.exe a0f17d336f6ad4173584c4e480f9a331 285
3. svcvmx.exe f5bca1127e3756a1acfeefe7aa504280 95
4. MicrosoftUpdater.exe 5b04fe6a2792db493ca3647cd0e04c97 37
5. vmxclient.exe 1381dc4d1aaf5f998bff3082b73b5617 32
6. vmxclient.exe 1ccf6d58dd1d572f1dae681a883a7c17 29
7. ct.exe 07cc10bec234649b55f68e0bb8bbdb5b 26
8. ct.exe 526e69673cde410a241cd7a483c41d77 24
9. MicrosoftUpdater.exe a830bf74a8b16055bac489bac23a0725 10
10. ct.exe f3a3acb50fa099b642725ae3bc920101 8
11. MicrosoftUpdater.exe 46d232a042ded217de8ef00bb821b499 7
12. winscr.exe b4d0d090c944ae7996002602646ab278 5
13. ct.exe 06ef0ff56313358f95f1095a92f3aa7f 5
14. svcvmx.exe 1bf8013a6f4ab3c9a0b7d7ff4e5ebe53 5
15. ct.exe b2934bb361ab6d408ffdec56a95b5f0d 2
16. ct.exe e1236e78efb8dc880cd01d65d2024079 2
17. ct.exe 649fa71d2992350bdcc323422167efe0 2
18. winscr.exe 6faf26851f4dc2753705b9b9143111c4 1
19. ct.exe 4744be9bf2a1818a205ffb47591baaf8 1
20. ct.exe f8c14821eb20b14932f76daeff5dfd08 1
21. svcvmx.exe 45904b7b77cb94a1218f792dc76745cf 1
22. vmxclient.exe 7d19505c067c06b6e508f7b4da756d8d 1
23. vmxclient.exe 5c105789553f13749d15a599872b18d5 1
More files

Registry Details

Trojan.Adload may create the following registry entry or registry entries:
CLSID
{04C86D67-7A4D-459E-8195-06E854B29482}
{EB438FB2-0FDA-4DEC-A7B3-5439EF85308C}
{F38FE51F-3A03-4218-9522-848D2FCCDD19}
Regexp file mask
%LOCALAPPDATA%\Apps\[NUMBERS]_installcube.exe
%LOCALAPPDATA%\Component\com.exe
%LOCALAPPDATA%\Hostinstaller\[NUMBERS]_installcube.exe
%LOCALAPPDATA%\ifgker\ifgker.exe
%LOCALAPPDATA%\MicrosoftUpdater\updater.exe
%LOCALAPPDATA%\ntuserlitelist\dataup\dataup.exe
%LOCALAPPDATA%\nvfontcache\nvfontcache.exe
%LOCALAPPDATA%\sysnet\sysnet.exe
%USERPROFILE%\Local Settings\Application Data\Component\com.exe
%USERPROFILE%\Local Settings\Application Data\Hostinstaller\[NUMBERS]_installcube.exe
%UserProfile%\Local Settings\Application Data\ifgker\ifgker.exe
%UserProfile%\Local Settings\Application Data\nvfontcache\nvfontcache.exe
%UserProfile%\Local Settings\Application Data\sysnet\sysnet.exe
%WINDIR%\System32\drivers\ndistpr64.sys
%WINDIR%\System32\Tasks\etdctrl
SOFTWARE\ifgker
SOFTWARE\Microsoft\Tracing\noteupd_RASAPI32
SOFTWARE\Microsoft\Tracing\noteupd_RASMANCS
SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\etdctrl
Software\notepad3k
SOFTWARE\Wow6432Node\ifgker
SOFTWARE\WOW6432Node\nvfontcache
SOFTWARE\Wow6432Node\wutphost
SOFTWARE\wutphost
SYSTEM\ControlSet001\Enum\Root\LEGACY_DRMKPRO64
SYSTEM\ControlSet001\services\drmkpro64
SYSTEM\ControlSet001\services\windowsmanagementservice
SYSTEM\ControlSet001\services\winupdsvc
SYSTEM\ControlSet002\Enum\Root\LEGACY_DRMKPRO64
SYSTEM\ControlSet002\services\Dataup
SYSTEM\ControlSet002\services\drmkpro64
SYSTEM\ControlSet002\services\eventlog\Application\Dataup
SYSTEM\ControlSet002\services\windowsmanagementservice
SYSTEM\ControlSet002\services\winupdsvc
SYSTEM\CurrentControlSet\Enum\Root\LEGACY_DRMKPRO64
SYSTEM\CurrentControlSet\services\drmkpro64
SYSTEM\CurrentControlSet\services\eventlog\Application\Dataup
SYSTEM\CurrentControlSet\services\windowsmanagementservice
SYSTEM\CurrentControlSet\services\winupdsvc

Directories

Trojan.Adload may create the following directory or directories:

%APPDATA%\notepad3k
%LOCALAPPDATA%\etdctrl
%LOCALAPPDATA%\llssoft
%LOCALAPPDATA%\microlabs
%LOCALAPPDATA%\ntuserlitelist
%LOCALAPPDATA%\wutphost
%PROGRAMFILES%\ntuserlitelist
%PROGRAMFILES(x86)%\ntuserlitelist
%UserProfile%\Local Settings\Application Data\etdctrl
%UserProfile%\Local Settings\Application Data\llssoft
%UserProfile%\Local Settings\Application Data\wutphost

Trending

Most Viewed

Loading...