epikrnnc.exe

The executable epikrnnc.exe has been detected as malware by 24 anti-virus scanners. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘xtwxsadx’. According to AVG, this software downloads additional adware offers during setup.
MD5:
430197814d01351b35a061dae6f501c4

SHA-1:
bda3fc2b2ee4e8c0fbc45824f9ffd610552077c6

SHA-256:
3e103d566901ff70df43133a500937d7ca37f6265d70efad8f7fa712ffba870f

Scanner detections:
24 / 68

Status:
Malware

Analysis date:
4/19/2024 12:42:43 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Zusy.112104
827

AegisLab AV Signature
Troj.W32.Gen
2.1.4+

Avira AntiVirus
TR/Kuluoz.A.391
7.11.182.50

avast!
Win32:Malware-gen
141025-0

AVG
Downloader.Generic14
2015.0.3305

Bitdefender
Gen:Variant.Zusy.112104
1.0.20.1515

Dr.Web
BackDoor.Kuluoz.4
9.0.1.05190

Emsisoft Anti-Malware
Gen:Variant.Zusy.112104
8.14.10.30.07

ESET NOD32
Win32/TrojanDownloader.Zortob
8.10641

Fortinet FortiGate
W32/Kryptik.COFI!tr
10/30/2014

F-Prot
W32/A-5035942b
v6.4.7.1.166

F-Secure
Gen:Variant.Zusy.112104
11.2014-30-10_5

G Data
Gen:Variant.Zusy.112104
14.10.24

Kaspersky
HEUR:Trojan.Win32.Generic
14.0.0.3021

McAfee
Downloader-FAII!430197814D01
5600.6961

Microsoft Security Essentials
Threat.Undefined
1.187.640.0

NANO AntiVirus
Trojan.Win32.Kryptik.dhbfhf
0.28.6.62995

Norman
Kuluoz.GO
11.20141030

Qihoo 360 Security
Malware.QVM10.Gen
1.0.0.1015

Sophos
Troj/Weelsof-IZ
4.98

SUPERAntiSpyware
Trojan.Agent/Gen-Graftor
10267

Total Defense
Win32/Kuluoz.FMFGTfD
37.0.11254

Trend Micro
TROJ_GEN.R08NC0DJS14
10.465.30

VIPRE Antivirus
Trojan.Win32.Generic.pak!cobra
34354

File size:
120 KB (122,880 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\Documents and Settings\{user}\Application data\epikrnnc.exe

File PE Metadata
Compilation timestamp:
10/23/2014 5:11:23 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
7.0

CTPH (ssdeep):
1536:QWWBSJter1Bo1yLtDe5tqq35jpAZdy8brcv/OttWGAFf0WVR+OE:QeS/Ne5tf35sytv/OtJAFfThE

Entry address:
0x2A22

Entry point:
E8, 68, 15, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A3, 18, E5, 41, 00, 89, 0D, 14, E5, 41, 00, 89, 15, 10, E5, 41, 00, 89, 1D, 0C, E5, 41, 00, 89, 35, 08, E5, 41, 00, 89, 3D, 04, E5, 41, 00, 66, 8C, 15, 30, E5, 41, 00, 66, 8C, 0D, 24, E5, 41, 00, 66, 8C, 1D, 00, E5, 41, 00, 66, 8C, 05, FC, E4, 41, 00, 66, 8C, 25, F8, E4, 41, 00, 66, 8C, 2D, F4, E4, 41, 00, 9C, 8F, 05, 28, E5, 41, 00, 8B, 45, 00, A3, 1C, E5, 41, 00, 8B, 45, 04, A3, 20, E5, 41, 00, 8D, 45, 08, A3, 2C, E5, 41...
 
[+]

Entropy:
6.5536

Code size:
45 KB (46,080 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
xtwxsadx

Command:
"C:\Documents and Settings\{user}\Application data\epikrnnc.exe"


Remove epikrnnc.exe - Powered by Reason Core Security