{"id":153,"date":"2009-06-17T16:49:09","date_gmt":"2009-06-17T08:49:09","guid":{"rendered":"http:\/\/www.sysadmindayph.com\/blog\/?p=153"},"modified":"2009-06-17T16:49:09","modified_gmt":"2009-06-17T08:49:09","slug":"wpv991242765100-viruses-spyware-adware-trojans-rootkits-worms","status":"publish","type":"post","link":"https:\/\/www.sysadmindayph.com\/blog\/wpv991242765100-viruses-spyware-adware-trojans-rootkits-worms\/","title":{"rendered":"wpv991242765100 &#8211; viruses, spyware, adware, trojans, rootkits, worms?"},"content":{"rendered":"<p><strong>wpv991242765100.exe<\/strong> &#8211; What is it? You may be wondering what this filename or process is when you try and searching for any malicious application running in you Windows XP\/VIsta machine.. (via Task manager).<\/p>\n<p><strong>wpv991242765100.exe&#8217;s<\/strong>\u00a0 could be viruses, spyware, adware, trojans, rootkits, worms, information stealers, keyloggers, bots&#8230; I for one is not sure, but I also have this process running in my windows machine and I just discovered that this is the culprit on some of my computer problems.<\/p>\n<p><strong>Problems Caused by wpv991242765100.exe<\/strong><\/p>\n<p>To list a few of the nuances that this process is doing on my <a href=\"http:\/\/www.sysadmindayph.com\/blog\/best-sony-viao-notebooks-and-laptops\/\">Viao laptop<\/a> *grin*:<\/p>\n<ul>\n<li>Prevented me from connecting to company&#8217;s VPN<\/li>\n<li>Prevents firefox to launch (and IE for that matter)<\/li>\n<li>No internet on firefox, but fine with IE<\/li>\n<li>and probably others.<\/li>\n<\/ul>\n<p><!--more--><\/p>\n<p>As of this writing, there&#8217;s only 1 page\/site on the entire internet for this word.. now there two.. mine included&#8230; Here&#8217;s some info on that rich content page:<\/p>\n<h2>File Behavior<\/h2>\n<p>WPV151242765100.EXE has been seen to perform the following behavior:<\/p>\n<ul>\n<li>The Process is packed and\/or encrypted using a software packing process<\/li>\n<\/ul>\n<p>WPV151242765100.EXE has been the subject of the following behavior:<\/p>\n<ul>\n<li>Added as a Registry auto start to load Program on Boot up<\/li>\n<\/ul>\n<h2>Country Of Origin<\/h2>\n<p>The filename WPV151242765100.EXE was first seen on May 20 2009 in the following geographical regions of the Prevx community:<\/p>\n<ul>\n<li style=\"background: url(http:\/\/www.sysadmindayph.com\/images2\/flags\/EG.gif) no-repeat left center;\">EGYPT on May 20 2009<\/li>\n<li style=\"background: url(http:\/\/www.sysadmindayph.com\/images2\/flags\/US.gif) no-repeat left center;\">The UNITED STATES on May 20 2009<\/li>\n<\/ul>\n<h2>File Name Aliases<\/h2>\n<p>WPV151242765100.EXE can also use the following file names:<\/p>\n<ul>\n<li>95545953.OUT<\/li>\n<li>46109827.EXE<\/li>\n<li>73433163.EXE<\/li>\n<li>WPV951242765100.EXE<\/li>\n<li>WPV991242765100.EXE<\/li>\n<li>WPV181242765100.EXE<\/li>\n<li>WPV041242765100.EXE<\/li>\n<li>WPV131242765100.EXE<\/li>\n<li>WPV651242765100.EXE<\/li>\n<li>WPV231242765100.EXE<\/li>\n<li>WPV701242765100.EXE<\/li>\n<li>WPV431242765100.EXE<\/li>\n<\/ul>\n<h2>Filesizes<\/h2>\n<p>This file has been seen with the following file size:<\/p>\n<ul>\n<li>428,032 bytes<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>wpv991242765100.exe &#8211; What is it? You may be wondering what this filename or process is when you try and searching for any malicious application running in you Windows XP\/VIsta machine.. (via Task manager). wpv991242765100.exe&#8217;s\u00a0 could &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8,165,192],"tags":[256,258,255,257,254,259,253],"class_list":["post-153","post","type-post","status-publish","format-standard","hentry","category-tips","category-tools","category-virus-and-microsoft","tag-adware","tag-rootkits","tag-spyware","tag-trojans","tag-viruses","tag-worms","tag-wpv991242765100"],"_links":{"self":[{"href":"https:\/\/www.sysadmindayph.com\/blog\/wp-json\/wp\/v2\/posts\/153","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sysadmindayph.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sysadmindayph.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sysadmindayph.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sysadmindayph.com\/blog\/wp-json\/wp\/v2\/comments?post=153"}],"version-history":[{"count":0,"href":"https:\/\/www.sysadmindayph.com\/blog\/wp-json\/wp\/v2\/posts\/153\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.sysadmindayph.com\/blog\/wp-json\/wp\/v2\/media?parent=153"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sysadmindayph.com\/blog\/wp-json\/wp\/v2\/categories?post=153"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sysadmindayph.com\/blog\/wp-json\/wp\/v2\/tags?post=153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}