Home / malware W32.Plagent
First posted on 10 September 2014.
Source: SymantecAliases :
There are no other names known for W32.Plagent.
Explanation :
When the worm is executed, it creates the following files:%Windir%\83D2CDE2-8311-40CB-B51D-EBE20FA803D1.dll%Temp%\spoolhost.exe%ProgramFiles%\Common Files\System\coreshell.dll
Next, the worm creates the following registry entry:
HKEY_CLASSES_ROOT\CLSID\{EF7652A4-98EF-5031-226B-11456C96A7EA}\InProcServer32\"(Default)" = "%ProgramFiles%\Common Files\System\\coreshell.dll"
The worm then connects to the following remote location:
[http://]adobeincorp.com/we[REMOVED]
The worm may then receive and process commands from this remote location.
The worm may spread through removable drives.Last update 10 September 2014