Cadux Trojan

Cadux malware description and removal detail
Categories:Trojan,Downloader
Also known as:

[Kaspersky]Trojan-Downloader.Win32.VB.aan,Hoax.Win32.Renos.dk,Trojan-downloader.Win32.Vb.avf,Hoax.Win32.Renos.fn,Trojan-Downloader.Win32.VB.att,Trojan.Win32.VB.azo,Trojan.Win32.BHO.he,Hoax.Win32.Renos.kj,Trojan-Downloader.Win32.VB.asx;
[McAfee]TFactory,FakeAlert-J,Generic AdClciker.h,Puper;
[Other]Trojan-Downloader.Win32.VB.aeq,cashdeluxe,DesktopScam,Win32/Cadux.BA,Win32/Cadux.AR,Win32/Cadux.BI,Win32/Cadux.BL,Win32/Cadux.BM,Win32/Cadux.BO,WIn32/Cadux.BN,Win32/Cadux.BS,TROJ_VB.FFB,W32/DLoader.CYBX

Visible Symptoms:
Files in system folders:
[%LOCAL_APPDATA%]\Temp\laf4.exe
[%PROFILE_TEMP%]\laf1.exe
[%PROFILE_TEMP%]\laf2.exe
[%SYSTEM%]\TMRSRV32.EXE
[%SYSTEM%]\adobepnl.dll
[%SYSTEM%]\ctqkqitc.exe
[%SYSTEM%]\ftxshflh.exe
[%SYSTEM%]\glhzhftb.exe
[%SYSTEM%]\hlydrdsd.exe
[%SYSTEM%]\ieffse32.dll
[%SYSTEM%]\iucnkhpw.exe
[%SYSTEM%]\kvpaibjs.exe
[%SYSTEM%]\lnfdacmb.exe
[%SYSTEM%]\miszjogw.exe
[%SYSTEM%]\orthihug.exe
[%SYSTEM%]\qjrkvy.exe
[%SYSTEM%]\questmod.dll
[%SYSTEM%]\rduawmpi.exe
[%SYSTEM%]\regmod.exe
[%SYSTEM%]\repigsp.exe
[%SYSTEM%]\runsrv32.dll
[%SYSTEM%]\runsrv32.exe
[%SYSTEM%]\tmrsrv32.exe
[%SYSTEM%]\udpmod.dll
[%SYSTEM%]\users32.exe
[%SYSTEM%]\wbycpxwc.exe
[%SYSTEM%]\winapi32.dll
[%SYSTEM%]\winbl32.dll
[%SYSTEM%]\winflash.dll
[%SYSTEM%]\wqjbaztr.exe
[%SYSTEM%]\ymjepyzw.exe
[%SYSTEM%]\ythrdjut.exe
[%SYSTEM%]\zddipbsu.exe
[%SYSTEM%]\zdphsuuy.exe
[%WINDOWS%]\about_spyware_bg.gif
[%WINDOWS%]\about_spyware_bottom.gif
[%WINDOWS%]\alexaie.dll
[%WINDOWS%]\alxie328.dll
[%WINDOWS%]\alxtb1.dll
[%WINDOWS%]\as.gif
[%WINDOWS%]\as_header.gif
[%WINDOWS%]\bg.gif
[%WINDOWS%]\box_1.gif
[%WINDOWS%]\box_2.gif
[%WINDOWS%]\box_3.gif
[%WINDOWS%]\button_buynow.gif
[%WINDOWS%]\button_freescan.gif
[%WINDOWS%]\close-bar.gif
[%WINDOWS%]\dlmax.dll
[%WINDOWS%]\download_box.gif
[%WINDOWS%]\features.gif
[%WINDOWS%]\fkwggshm.exe
[%WINDOWS%]\footer_back.gif
[%WINDOWS%]\footer_back.jpg
[%WINDOWS%]\header_1.gif
[%WINDOWS%]\header_2.gif
[%WINDOWS%]\header_3.gif
[%WINDOWS%]\header_4.gif
[%WINDOWS%]\infected.gif
[%WINDOWS%]\main_back.gif
[%WINDOWS%]\rf.gif
[%WINDOWS%]\rf_header.gif
[%WINDOWS%]\scan_btn.gif
[%WINDOWS%]\security-center-bg.gif
[%WINDOWS%]\security-center-logo.gif
[%WINDOWS%]\security_center_caption.gif
[%WINDOWS%]\sep_hor.gif
[%WINDOWS%]\sep_vert.gif
[%WINDOWS%]\spacer.gif'
[%WINDOWS%]\spyware-detected.gif
[%WINDOWS%]\star.gif
[%WINDOWS%]\star_gray.gif
[%WINDOWS%]\star_gray_small.gif
[%WINDOWS%]\star_small.gif
[%WINDOWS%]\susp.exe
[%WINDOWS%]\sysrlb32.exe
[%WINDOWS%]\ts.gif
[%WINDOWS%]\ts_header.gif
[%WINDOWS%]\v.gif
[%WINDOWS%]\warning-bar-ico.gif
[%WINDOWS%]\warning_icon.gif
[%WINDOWS%]\winh32.exe
[%WINDOWS%]\win_logo.gif
[%WINDOWS%]\x.gif
[%SYSTEM%]\kjdylhup.exe
[%SYSTEM%]\msdn_lib.dll
[%SYSTEM%]\SCCVHOST.exe
[%SYSTEM%]\SCCVHOSThk.dll
[%SYSTEM%]\SCCVHOSTr.exe
[%SYSTEM%]\SCCVHOSTwb.dll
[%LOCAL_APPDATA%]\Temp\laf4.exe
[%PROFILE_TEMP%]\laf1.exe
[%PROFILE_TEMP%]\laf2.exe
[%SYSTEM%]\TMRSRV32.EXE
[%SYSTEM%]\adobepnl.dll
[%SYSTEM%]\ctqkqitc.exe
[%SYSTEM%]\ftxshflh.exe
[%SYSTEM%]\glhzhftb.exe
[%SYSTEM%]\hlydrdsd.exe
[%SYSTEM%]\ieffse32.dll
[%SYSTEM%]\iucnkhpw.exe
[%SYSTEM%]\kvpaibjs.exe
[%SYSTEM%]\lnfdacmb.exe
[%SYSTEM%]\miszjogw.exe
[%SYSTEM%]\orthihug.exe
[%SYSTEM%]\qjrkvy.exe
[%SYSTEM%]\questmod.dll
[%SYSTEM%]\rduawmpi.exe
[%SYSTEM%]\regmod.exe
[%SYSTEM%]\repigsp.exe
[%SYSTEM%]\runsrv32.dll
[%SYSTEM%]\runsrv32.exe
[%SYSTEM%]\tmrsrv32.exe
[%SYSTEM%]\udpmod.dll
[%SYSTEM%]\users32.exe
[%SYSTEM%]\wbycpxwc.exe
[%SYSTEM%]\winapi32.dll
[%SYSTEM%]\winbl32.dll
[%SYSTEM%]\winflash.dll
[%SYSTEM%]\wqjbaztr.exe
[%SYSTEM%]\ymjepyzw.exe
[%SYSTEM%]\ythrdjut.exe
[%SYSTEM%]\zddipbsu.exe
[%SYSTEM%]\zdphsuuy.exe
[%WINDOWS%]\about_spyware_bg.gif
[%WINDOWS%]\about_spyware_bottom.gif
[%WINDOWS%]\alexaie.dll
[%WINDOWS%]\alxie328.dll
[%WINDOWS%]\alxtb1.dll
[%WINDOWS%]\as.gif
[%WINDOWS%]\as_header.gif
[%WINDOWS%]\bg.gif
[%WINDOWS%]\box_1.gif
[%WINDOWS%]\box_2.gif
[%WINDOWS%]\box_3.gif
[%WINDOWS%]\button_buynow.gif
[%WINDOWS%]\button_freescan.gif
[%WINDOWS%]\close-bar.gif
[%WINDOWS%]\dlmax.dll
[%WINDOWS%]\download_box.gif
[%WINDOWS%]\features.gif
[%WINDOWS%]\fkwggshm.exe
[%WINDOWS%]\footer_back.gif
[%WINDOWS%]\footer_back.jpg
[%WINDOWS%]\header_1.gif
[%WINDOWS%]\header_2.gif
[%WINDOWS%]\header_3.gif
[%WINDOWS%]\header_4.gif
[%WINDOWS%]\infected.gif
[%WINDOWS%]\main_back.gif
[%WINDOWS%]\rf.gif
[%WINDOWS%]\rf_header.gif
[%WINDOWS%]\scan_btn.gif
[%WINDOWS%]\security-center-bg.gif
[%WINDOWS%]\security-center-logo.gif
[%WINDOWS%]\security_center_caption.gif
[%WINDOWS%]\sep_hor.gif
[%WINDOWS%]\sep_vert.gif
[%WINDOWS%]\spacer.gif'
[%WINDOWS%]\spyware-detected.gif
[%WINDOWS%]\star.gif
[%WINDOWS%]\star_gray.gif
[%WINDOWS%]\star_gray_small.gif
[%WINDOWS%]\star_small.gif
[%WINDOWS%]\susp.exe
[%WINDOWS%]\sysrlb32.exe
[%WINDOWS%]\ts.gif
[%WINDOWS%]\ts_header.gif
[%WINDOWS%]\v.gif
[%WINDOWS%]\warning-bar-ico.gif
[%WINDOWS%]\warning_icon.gif
[%WINDOWS%]\winh32.exe
[%WINDOWS%]\win_logo.gif
[%WINDOWS%]\x.gif
[%SYSTEM%]\kjdylhup.exe
[%SYSTEM%]\msdn_lib.dll
[%SYSTEM%]\SCCVHOST.exe
[%SYSTEM%]\SCCVHOSThk.dll
[%SYSTEM%]\SCCVHOSTr.exe
[%SYSTEM%]\SCCVHOSTwb.dll

In order to ensure that the Cadux is launched automatically each time the system is booted, the Cadux adds a link to its executable file in the system registry:
HKLM\Microsoft\Windows\CurrentVersion\Run
[%LOCAL_APPDATA%]\Temp\laf4.exe
[%PROFILE_TEMP%]\laf1.exe
[%PROFILE_TEMP%]\laf2.exe
[%SYSTEM%]\ctqkqitc.exe
[%SYSTEM%]\ftxshflh.exe
[%SYSTEM%]\glhzhftb.exe
[%SYSTEM%]\hlydrdsd.exe
[%SYSTEM%]\iucnkhpw.exe
[%SYSTEM%]\kvpaibjs.exe
[%SYSTEM%]\lnfdacmb.exe
[%SYSTEM%]\miszjogw.exe
[%SYSTEM%]\orthihug.exe
[%SYSTEM%]\qjrkvy.exe
[%SYSTEM%]\rduawmpi.exe
[%SYSTEM%]\regmod.exe
[%SYSTEM%]\repigsp.exe
[%SYSTEM%]\runsrv32.exe
[%SYSTEM%]\tmrsrv32.exe
[%SYSTEM%]\users32.exe
[%SYSTEM%]\wbycpxwc.exe
[%SYSTEM%]\wqjbaztr.exe
[%SYSTEM%]\ymjepyzw.exe
[%SYSTEM%]\ythrdjut.exe
[%SYSTEM%]\zddipbsu.exe
[%SYSTEM%]\zdphsuuy.exe
[%WINDOWS%]\fkwggshm.exe
[%WINDOWS%]\susp.exe
[%WINDOWS%]\sysrlb32.exe
[%WINDOWS%]\winh32.exe
[%SYSTEM%]\kjdylhup.exe
[%SYSTEM%]\SCCVHOST.exe
[%SYSTEM%]\SCCVHOSTr.exe

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting Cadux:

Files:
[%LOCAL_APPDATA%]\Temp\laf4.exe
[%PROFILE_TEMP%]\laf1.exe
[%PROFILE_TEMP%]\laf2.exe
[%SYSTEM%]\TMRSRV32.EXE
[%SYSTEM%]\adobepnl.dll
[%SYSTEM%]\ctqkqitc.exe
[%SYSTEM%]\ftxshflh.exe
[%SYSTEM%]\glhzhftb.exe
[%SYSTEM%]\hlydrdsd.exe
[%SYSTEM%]\ieffse32.dll
[%SYSTEM%]\iucnkhpw.exe
[%SYSTEM%]\kvpaibjs.exe
[%SYSTEM%]\lnfdacmb.exe
[%SYSTEM%]\miszjogw.exe
[%SYSTEM%]\orthihug.exe
[%SYSTEM%]\qjrkvy.exe
[%SYSTEM%]\questmod.dll
[%SYSTEM%]\rduawmpi.exe
[%SYSTEM%]\regmod.exe
[%SYSTEM%]\repigsp.exe
[%SYSTEM%]\runsrv32.dll
[%SYSTEM%]\runsrv32.exe
[%SYSTEM%]\tmrsrv32.exe
[%SYSTEM%]\udpmod.dll
[%SYSTEM%]\users32.exe
[%SYSTEM%]\wbycpxwc.exe
[%SYSTEM%]\winapi32.dll
[%SYSTEM%]\winbl32.dll
[%SYSTEM%]\winflash.dll
[%SYSTEM%]\wqjbaztr.exe
[%SYSTEM%]\ymjepyzw.exe
[%SYSTEM%]\ythrdjut.exe
[%SYSTEM%]\zddipbsu.exe
[%SYSTEM%]\zdphsuuy.exe
[%WINDOWS%]\about_spyware_bg.gif
[%WINDOWS%]\about_spyware_bottom.gif
[%WINDOWS%]\alexaie.dll
[%WINDOWS%]\alxie328.dll
[%WINDOWS%]\alxtb1.dll
[%WINDOWS%]\as.gif
[%WINDOWS%]\as_header.gif
[%WINDOWS%]\bg.gif
[%WINDOWS%]\box_1.gif
[%WINDOWS%]\box_2.gif
[%WINDOWS%]\box_3.gif
[%WINDOWS%]\button_buynow.gif
[%WINDOWS%]\button_freescan.gif
[%WINDOWS%]\close-bar.gif
[%WINDOWS%]\dlmax.dll
[%WINDOWS%]\download_box.gif
[%WINDOWS%]\features.gif
[%WINDOWS%]\fkwggshm.exe
[%WINDOWS%]\footer_back.gif
[%WINDOWS%]\footer_back.jpg
[%WINDOWS%]\header_1.gif
[%WINDOWS%]\header_2.gif
[%WINDOWS%]\header_3.gif
[%WINDOWS%]\header_4.gif
[%WINDOWS%]\infected.gif
[%WINDOWS%]\main_back.gif
[%WINDOWS%]\rf.gif
[%WINDOWS%]\rf_header.gif
[%WINDOWS%]\scan_btn.gif
[%WINDOWS%]\security-center-bg.gif
[%WINDOWS%]\security-center-logo.gif
[%WINDOWS%]\security_center_caption.gif
[%WINDOWS%]\sep_hor.gif
[%WINDOWS%]\sep_vert.gif
[%WINDOWS%]\spacer.gif'
[%WINDOWS%]\spyware-detected.gif
[%WINDOWS%]\star.gif
[%WINDOWS%]\star_gray.gif
[%WINDOWS%]\star_gray_small.gif
[%WINDOWS%]\star_small.gif
[%WINDOWS%]\susp.exe
[%WINDOWS%]\sysrlb32.exe
[%WINDOWS%]\ts.gif
[%WINDOWS%]\ts_header.gif
[%WINDOWS%]\v.gif
[%WINDOWS%]\warning-bar-ico.gif
[%WINDOWS%]\warning_icon.gif
[%WINDOWS%]\winh32.exe
[%WINDOWS%]\win_logo.gif
[%WINDOWS%]\x.gif
[%SYSTEM%]\kjdylhup.exe
[%SYSTEM%]\msdn_lib.dll
[%SYSTEM%]\SCCVHOST.exe
[%SYSTEM%]\SCCVHOSThk.dll
[%SYSTEM%]\SCCVHOSTr.exe
[%SYSTEM%]\SCCVHOSTwb.dll
[%LOCAL_APPDATA%]\Temp\laf4.exe
[%PROFILE_TEMP%]\laf1.exe
[%PROFILE_TEMP%]\laf2.exe
[%SYSTEM%]\TMRSRV32.EXE
[%SYSTEM%]\adobepnl.dll
[%SYSTEM%]\ctqkqitc.exe
[%SYSTEM%]\ftxshflh.exe
[%SYSTEM%]\glhzhftb.exe
[%SYSTEM%]\hlydrdsd.exe
[%SYSTEM%]\ieffse32.dll
[%SYSTEM%]\iucnkhpw.exe
[%SYSTEM%]\kvpaibjs.exe
[%SYSTEM%]\lnfdacmb.exe
[%SYSTEM%]\miszjogw.exe
[%SYSTEM%]\orthihug.exe
[%SYSTEM%]\qjrkvy.exe
[%SYSTEM%]\questmod.dll
[%SYSTEM%]\rduawmpi.exe
[%SYSTEM%]\regmod.exe
[%SYSTEM%]\repigsp.exe
[%SYSTEM%]\runsrv32.dll
[%SYSTEM%]\runsrv32.exe
[%SYSTEM%]\tmrsrv32.exe
[%SYSTEM%]\udpmod.dll
[%SYSTEM%]\users32.exe
[%SYSTEM%]\wbycpxwc.exe
[%SYSTEM%]\winapi32.dll
[%SYSTEM%]\winbl32.dll
[%SYSTEM%]\winflash.dll
[%SYSTEM%]\wqjbaztr.exe
[%SYSTEM%]\ymjepyzw.exe
[%SYSTEM%]\ythrdjut.exe
[%SYSTEM%]\zddipbsu.exe
[%SYSTEM%]\zdphsuuy.exe
[%WINDOWS%]\about_spyware_bg.gif
[%WINDOWS%]\about_spyware_bottom.gif
[%WINDOWS%]\alexaie.dll
[%WINDOWS%]\alxie328.dll
[%WINDOWS%]\alxtb1.dll
[%WINDOWS%]\as.gif
[%WINDOWS%]\as_header.gif
[%WINDOWS%]\bg.gif
[%WINDOWS%]\box_1.gif
[%WINDOWS%]\box_2.gif
[%WINDOWS%]\box_3.gif
[%WINDOWS%]\button_buynow.gif
[%WINDOWS%]\button_freescan.gif
[%WINDOWS%]\close-bar.gif
[%WINDOWS%]\dlmax.dll
[%WINDOWS%]\download_box.gif
[%WINDOWS%]\features.gif
[%WINDOWS%]\fkwggshm.exe
[%WINDOWS%]\footer_back.gif
[%WINDOWS%]\footer_back.jpg
[%WINDOWS%]\header_1.gif
[%WINDOWS%]\header_2.gif
[%WINDOWS%]\header_3.gif
[%WINDOWS%]\header_4.gif
[%WINDOWS%]\infected.gif
[%WINDOWS%]\main_back.gif
[%WINDOWS%]\rf.gif
[%WINDOWS%]\rf_header.gif
[%WINDOWS%]\scan_btn.gif
[%WINDOWS%]\security-center-bg.gif
[%WINDOWS%]\security-center-logo.gif
[%WINDOWS%]\security_center_caption.gif
[%WINDOWS%]\sep_hor.gif
[%WINDOWS%]\sep_vert.gif
[%WINDOWS%]\spacer.gif'
[%WINDOWS%]\spyware-detected.gif
[%WINDOWS%]\star.gif
[%WINDOWS%]\star_gray.gif
[%WINDOWS%]\star_gray_small.gif
[%WINDOWS%]\star_small.gif
[%WINDOWS%]\susp.exe
[%WINDOWS%]\sysrlb32.exe
[%WINDOWS%]\ts.gif
[%WINDOWS%]\ts_header.gif
[%WINDOWS%]\v.gif
[%WINDOWS%]\warning-bar-ico.gif
[%WINDOWS%]\warning_icon.gif
[%WINDOWS%]\winh32.exe
[%WINDOWS%]\win_logo.gif
[%WINDOWS%]\x.gif
[%SYSTEM%]\kjdylhup.exe
[%SYSTEM%]\msdn_lib.dll
[%SYSTEM%]\SCCVHOST.exe
[%SYSTEM%]\SCCVHOSThk.dll
[%SYSTEM%]\SCCVHOSTr.exe
[%SYSTEM%]\SCCVHOSTwb.dll

Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{38847C4B-1AB1-4A47-9026-9A6CF7B43D31}
HKEY_CLASSES_ROOT\clsid\{cfd25b9c-7441-4dbf-a3c6-2f505a22df55}
HKEY_CLASSES_ROOT\CLSID\{E52DEDBB-D168-4BDB-B229-C48160800E81}
HKEY_CLASSES_ROOT\interface\{74ac67a5-cdb1-4fd2-a30b-47bd59ff28a9}
HKEY_CLASSES_ROOT\popup.htmlevent.
HKEY_CLASSES_ROOT\TypeLib\{31F9B5A7-5B94-445D-922C-E97BF52F5FD7}
HKEY_CLASSES_ROOT\typelib\{be5bad2f-0859-4f5e-9740-73f8bec1cc1d}
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C3E7E8D3-0B97-4FF3-B1BD-DAB4B04CD697}
HKEY_CLASSES_ROOT\clsid\{2f2a3e91-f546-4df6-b9af-efea782ad495}
HKEY_CLASSES_ROOT\clsid\{38847c4b-1ab1-4a47-9026-9a6cf7b43d31}
HKEY_CLASSES_ROOT\clsid\{62e2e094-f989-48c6-b947-6e79da2294f9}
HKEY_CLASSES_ROOT\clsid\{b52ccf85-726d-471c-b72c-ca9f104c5b98}
HKEY_CLASSES_ROOT\clsid\{c3e7e8d3-0b97-4ff3-b1bd-dab4b04cd697}
HKEY_CLASSES_ROOT\clsid\{e52dedbb-d168-4bdb-b229-c48160800e81}
HKEY_CLASSES_ROOT\interface\{d23ac13d-4545-47cf-b83f-d95454e88b6a}
HKEY_CLASSES_ROOT\typelib\{31f9b5a7-5b94-445d-922c-e97bf52f5fd7}
HKEY_CLASSES_ROOT\typelib\{aa63a2b7-7c87-4c70-b10f-5c3599087378}\1.0
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{c3e7e8d3-0b97-4ff3-b1bd-dab4b04cd697}

Registry Values:
HKEY_CLASSES_ROOT\url_relpacer.urlresolver
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runonce\srv32 spool service
HKEY_LOCAL_MACHINE\software\software\tps108
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\software\tps108

Removing Cadux:

An up-to-date copy of ExterminateIt should detect and prevent infection from Cadux.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Cadux manually.

To completely manually remove Cadux malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Cadux.

  1. Use Task Manager to terminate the Cadux process.
  2. Delete the original Cadux file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Cadux from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Cadux!


Also Be Aware of the Following Threats:
Vxidl.AJZ Trojan Removal
Pigeon.AVGC Trojan Symptoms
Remove Japanese.Christmas Trojan
Skowor.O Worm Cleaner

0 comments:

Post a Comment

Blog Archive