msvyqi.exe - Dangerous

msvyqi.exe

Manual removal instructions:

Antivirus Report of msvyqi.exe:
msvyqi.exe Malware
msvyqi.exeDangerous
msvyqi.exeHigh Risk
msvyqi.exe
We suggest you to remove msbzej.exe from your computer as soon as possible.
Msbzej.exe is Trojan/Backdoor.
Kill the process msbzej.exe and remove msbzej.exe from Windows startup.

File: winres.exe (C:\sand-box\winres.exe)

Classification:
Antivirus Version Last Update Result
Avast 4.8.1335.0 2009.07.18 Win32:VB-LYG
AVG 8.5.0.387 2009.07.19 Dropper.Agent.NOU
BitDefender 7.2 2009.07.19 -
Comodo 1697 2009.07.19 -
DrWeb 5.0.0.12182 2009.07.18 Trojan.MulDrop.32578
F-Secure 8.0.14470.0 2009.07.18 Trojan-Dropper.Win32.Agent.aven
Kaspersky 7.0.0.125 2009.07.19 Trojan-Dropper.Win32.Agent.aven
Microsoft 1.4803 2009.07.19 Worm:Win32/VB.CM
NOD32 4257 2009.07.18 a variant of Win32/TrojanClicker.VB.NIM
Symantec 1.4.4.12 2009.07.19 -

Additional information
File size: 128512 bytes
MD5 : 1e796a0166317b8d1b9ba2d9405f8841
SHA1 : 876e7822b42407d782cfc0b0cadc5ca3e5d55d0d

Installation
When the program is executed, it creates the following registry subkeys and values:

----------------------------------
Keys added:24
----------------------------------
HKLM\SOFTWARE\Classes\CLSID\{540D8A8B-1C3F-4E32-8132-530F6A502090}\Implemented Categories
HKLM\SOFTWARE\Classes\CLSID\{540D8A8B-1C3F-4E32-8132-530F6A502090}\Implemented Categories\{00021492-0000-0000-C000-000000000046}
HKLM\SOFTWARE\Classes\csfile
HKLM\SOFTWARE\Classes\csfile\DefaultIcon
HKLM\SOFTWARE\Classes\csfile\shell
HKLM\SOFTWARE\Classes\csfile\shell\open
HKLM\SOFTWARE\Classes\csfile\shell\open\command
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\NOHIDORSYS
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run
HKCU\Keyboard Layout\Toggle
HKCU\Software\Microsoft\CTF\Assemblies
HKCU\Software\Microsoft\CTF\LangBar
HKCU\Software\Microsoft\CTF\MSUTB
HKCU\Software\Microsoft\CTF\Sapilayr
HKCU\Software\Microsoft\CTF\TIP
HKCU\Software\Microsoft\CTF\TIP\{DCBD6FA8-032F-11D3-B5B1-00C04FC324A1}
HKCU\Software\Microsoft\CTF\TIP\{DCBD6FA8-032F-11D3-B5B1-00C04FC324A1}\LanguageProfile
HKCU\Software\Microsoft\CTF\TIP\{DCBD6FA8-032F-11D3-B5B1-00C04FC324A1}\LanguageProfile\0x00000409
HKCU\Software\Microsoft\CTF\TIP\{DCBD6FA8-032F-11D3-B5B1-00C04FC324A1}\LanguageProfile\0x00000409\{09EA4E4B-46CE-4469-B450-0DE76A435BBB}
HKCU\Software\Microsoft\Internet Explorer\LowRegistry\Extensions
HKCU\Software\Microsoft\Internet Explorer\LowRegistry\Extensions\CmdMapping
HKCU\Software\Microsoft\SAPI Layer
HKCU\Software\Microsoft\Speech

----------------------------------
Values added:20
----------------------------------
HKLM\SOFTWARE\Classes\csfile\shell\open\command\: "C:\WINDOWS\system32\msyeoq.exe "%1" %*"
HKLM\SOFTWARE\Classes\csfile\DefaultIcon\: "%1"
HKLM\SOFTWARE\Microsoft\Internet Explorer\Main\Use FormSuggest: "yes"
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\NOHIDORSYS\CheckedValue: 0x00000000
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run\exec: "C:\WINDOWS\system32\msbzej.exe"
HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions: 0x00000000
HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\WINDOWS\fonts\services.exe: "C:\WINDOWS\fonts\services.exe:*:Enabled:services.exe"
HKCU\Software\Microsoft\CTF\TIP\{DCBD6FA8-032F-11D3-B5B1-00C04FC324A1}\LanguageProfile\0x00000409\{09EA4E4B-46CE-4469-B450-0DE76A435BBB}\Enable: 0x00000000
HKCU\Software\Microsoft\CTF\Sapilayr\ProfileInitialized: 0x00000001
HKCU\Software\Microsoft\CTF\MSUTB\Left: 0x000002EA
HKCU\Software\Microsoft\CTF\MSUTB\Top: 0x00000000
HKCU\Software\Microsoft\CTF\MSUTB\Vertical: 0x00000000
HKCU\Software\Microsoft\CTF\LangBar\ExtraIconsOnMinimized: 0x00000001
HKCU\Software\Microsoft\CTF\LangBar\ShowStatus: 0x00000004
HKCU\Software\Microsoft\Internet Explorer\LowRegistry\Extensions\CmdMapping\{e2e2dd38-d088-4134-82b7-f2ba38496583}: 0x00002000
HKCU\Software\Microsoft\Internet Explorer\LowRegistry\Extensions\CmdMapping\NextId: 0x00002001
HKCU\Software\Microsoft\Internet Explorer\Main\Use FormSuggest: "yes"
HKCU\Software\Microsoft\Internet Explorer\Main\DisableScriptDebuggerIE: "yes"
HKCU\Software\Microsoft\Internet Explorer\Main\Error Dlg Displayed On Every Error: "no"
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe: "C:\WINDOWS\system32\ctfmon.exe"

----------------------------------
Values modified:28
----------------------------------
HKLM\SOFTWARE\Classes\.bat\: "batfile"
HKLM\SOFTWARE\Classes\.bat\: "csfile"
HKLM\SOFTWARE\Classes\.com\: "comfile"
HKLM\SOFTWARE\Classes\.com\: "csfile"
HKLM\SOFTWARE\Classes\.exe\: "exefile"
HKLM\SOFTWARE\Classes\.exe\: "csfile"
HKLM\SOFTWARE\Classes\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\: "C:\WINDOWS\system32\mswinsck.ocx"
HKLM\SOFTWARE\Classes\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\: "C:\WINDOWS\system32\MSWINSCK.OCX"
HKLM\SOFTWARE\Classes\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ToolboxBitmap32\: "C:\WINDOWS\system32\mswinsck.ocx, 1"
HKLM\SOFTWARE\Classes\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ToolboxBitmap32\: "C:\WINDOWS\system32\MSWINSCK.OCX, 1"
HKLM\SOFTWARE\Classes\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\: "C:\WINDOWS\system32\mswinsck.ocx"
HKLM\SOFTWARE\Classes\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\: "C:\WINDOWS\system32\MSWINSCK.OCX"
HKLM\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\0\win32\: "C:\WINDOWS\system32\mswinsck.ocx"
HKLM\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\0\win32\: "C:\WINDOWS\system32\MSWINSCK.OCX"
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL\CheckedValue: 0x00000001
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL\CheckedValue: 0x00000000
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AeDebug\Auto: "1"
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AeDebug\Auto: "0"
HKCU\AppEvents\Schemes\Apps\Explorer\Navigating\.Current\: "%SystemRoot%\media\Windows Navigation Start.wav"
HKCU\AppEvents\Schemes\Apps\Explorer\Navigating\.Current\: ""
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Streams\Desktop\TaskbarWinXP: 0C 00 00 00 08 00 00 00 01 00 00 00 00 00 00 00 AA 4F 28 68 48 6A D0 11 8C 78 00 C0 4F D9 18 B4 0C 03 00 00 60 0D 00 00 00 00 00 00 16 00 00 00 00 00 00 00 00 00 00 00 16 00 00 00 00 00 00 00 01 00 00 00
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Streams\Desktop\TaskbarWinXP: 0C 00 00 00 08 00 00 00 02 00 00 00 00 00 00 00 AA 4F 28 68 48 6A D0 11 8C 78 00 C0 4F D9 18 B4 40 02 00 00 60 0D 00 00 00 00 00 00 16 00 00 00 00 00 00 00 00 00 00 00 16 00 00 00 00 00 00 00 01 00 00 00 01 00 00 00 8B 8A 0D 54 3F 1C 32 4E 81 32 53 0F 6A 50 20 90 2F 00 00 00 60 05 00 00 00 00 00 00 18 00 00 00 00 00 00 00 00 00 00 00 18 00 00 00 00 00 00 00 01 00 00 00
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\StuckRects2\Settings: 28 00 00 00 FF FF FF FF 02 00 00 00 03 00 00 00 6B 00 00 00 1E 00 00 00 FE FF FF FF 3C 02 00 00 22 03 00 00 5A 02 00 00
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\StuckRects2\Settings: 28 00 00 00 FF FF FF FF 02 00 00 00 03 00 00 00 6B 00 00 00 20 00 00 00 FE FF FF FF 3A 02 00 00 22 03 00 00 5A 02 00 00
HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\load: ""
HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\load: "C:\WINDOWS\system32\msvyqi.exe"
HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\run: ""
HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\run: "C:\WINDOWS\system32\msuuvnjq.exe"

----------------------------------
Files added:14
----------------------------------
C:\WINDOWS\Fonts\cooecp.tlb
C:\WINDOWS\Fonts\logcde.dll
C:\WINDOWS\Fonts\services.exe
C:\WINDOWS\Fonts\windef.dll
C:\WINDOWS\Fonts\windef.Log
C:\WINDOWS\Fonts\winpaged.ocx
C:\WINDOWS\system32\msbzej.exe
C:\WINDOWS\system32\mskbpxgs.exe
C:\WINDOWS\system32\msnhjc.exe
C:\WINDOWS\system32\msnvwx.exe
C:\WINDOWS\system32\mspoy.exe
C:\WINDOWS\system32\msuuvnjq.exe
C:\WINDOWS\system32\msvyqi.exe
C:\WINDOWS\system32\msyeoq.exe

----------------------------------
Files deleted:1
----------------------------------
C:\sand-box\winres.exe

----------------------------------
Files [attributes?] modified:1
----------------------------------
C:\WINDOWS\system32\wbem\Logs\wbemcore.log

----------------------------------
Folders added:0
----------------------------------

----------------------------------
Folders deleted:0
----------------------------------

----------------------------------
Total changes:88
----------------------------------

-------------------------------------------------------------------------------------
Detected by RegRun Reanimator:

Item Name: services.exe
Author:
Related File: C:\WINDOWS\FONTS\SERVICES.EXE
Type: Running Processes

Item Name: .exe
Author: Unknown
Related File: C:\WINDOWS\system32\mspkxw.exe "%1" %*
Type: Main File Extensions

Item Name: .com
Author: Unknown
Related File: C:\WINDOWS\system32\msaootwx.exe "%1" %*
Type: Main File Extensions

Item Name: .bat
Author: Unknown
Related File: C:\WINDOWS\system32\msaootwx.exe "%1" %*
Type: Main File Extensions

Item Name: exec
Author: -
Related File: C:\WINDOWS\system32\mszthyxl.exe
Type: Explorer Run

Item Name: load
Author: Unknown
Related File: C:\WINDOWS\system32\msswepg.exe
Type: Win.ini

Item Name: run
Author: Unknown
Related File: C:\WINDOWS\system32\msqaxebc.exe
Type: Win.ini

Removal Results: Success
Number of reboot: 1
-------------------------------------------------------------------------------------

Recommended software:
UnHackMe anti-rootkit and anti-malware
http://www.unhackme.com
RegRun Security Suite (Good choice for removal and protection)

Remove msvyqi.exe now!

Dmitry Sokolov:

I created UnHackMe in 2006 to fix the problem that antivioruses did not fix: detecting rootkits.

Since that time I work every day to fix the issues that antiviruses cannot.

If your antivirus have not helped you solve the problem, you should try UnHackMe.

We are a small company and you can ask me directly, if you have any questions.

Testimonials

You can read UnHackMe testimonials here.