Qinq Trojan

Qinq virus description
Technical details:
Categories: Trojan
Qinq Aliases:
[Other]Win32/Qinq.2ff!Dropper

Qinq Files:
[%PROFILE_TEMP%]\webhitlogtmp.dat
[%SYSTEM%]\d3d1caps.SRG
[%SYSTEM%]\downews.ini
[%SYSTEM%]\mprmsgse.axz
[%SYSTEM%]\mywebhit.ini
[%WINDOWS%]\mywinsys.ini
[%PROFILE_TEMP%]\bind_50202.pif
[%PROFILE_TEMP%]\p_star_1.jpg
[%PROFILE_TEMP%]\SCI10.tmp
[%SYSTEM%]\11680262935.exe
[%SYSTEM%]\11680264376.exe
[%SYSTEM%]\11680264767.exe
[%SYSTEM%]\11680271234.exe
[%SYSTEM%]\11680271975.exe
[%SYSTEM%]\11680272941.exe
[%SYSTEM%]\drivers\restore.dll
[%SYSTEM%]\drivers\restore.ini
[%SYSTEM%]\drivers\s1218.exe
[%SYSTEM%]\drivers\wsuuxv47.sys
[%SYSTEM%]\js1168026106.web
[%SYSTEM%]\js1168027022.web
[%SYSTEM%]\mywebhit.ini.tmp
[%SYSTEM%]\popnews.ini
[%SYSTEM%]\QQhx.dat
[%SYSTEM%]\s1168026049.web
[%SYSTEM%]\s1168027022.web
[%WINDOWS%]\hitpop_tmp.txt
[%WINDOWS%]\system\10034.exe
[%WINDOWS%]\system\dodolook069.exe
[%WINDOWS%]\system\Setup-139.exe
[%PROFILE_TEMP%]\webhitlogtmp.dat
[%SYSTEM%]\d3d1caps.SRG
[%SYSTEM%]\downews.ini
[%SYSTEM%]\mprmsgse.axz
[%SYSTEM%]\mywebhit.ini
[%WINDOWS%]\mywinsys.ini
[%PROFILE_TEMP%]\bind_50202.pif
[%PROFILE_TEMP%]\p_star_1.jpg
[%PROFILE_TEMP%]\SCI10.tmp
[%SYSTEM%]\11680262935.exe
[%SYSTEM%]\11680264376.exe
[%SYSTEM%]\11680264767.exe
[%SYSTEM%]\11680271234.exe
[%SYSTEM%]\11680271975.exe
[%SYSTEM%]\11680272941.exe
[%SYSTEM%]\drivers\restore.dll
[%SYSTEM%]\drivers\restore.ini
[%SYSTEM%]\drivers\s1218.exe
[%SYSTEM%]\drivers\wsuuxv47.sys
[%SYSTEM%]\js1168026106.web
[%SYSTEM%]\js1168027022.web
[%SYSTEM%]\mywebhit.ini.tmp
[%SYSTEM%]\popnews.ini
[%SYSTEM%]\QQhx.dat
[%SYSTEM%]\s1168026049.web
[%SYSTEM%]\s1168027022.web
[%WINDOWS%]\hitpop_tmp.txt
[%WINDOWS%]\system\10034.exe
[%WINDOWS%]\system\dodolook069.exe
[%WINDOWS%]\system\Setup-139.exe


Qinq indications of infection

This symptoms of Qinq detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove ScreenGrab RAT
Bancos.HRV Trojan Symptoms
Goldun.ar Spyware Removal

No comments: