Yedek dediğin ?
File Behavior
READER_S.EXE has been seen to perform the following behavior:
Executes a Process
This process creates other processes on disk
This Process is a file infector which modifies program files to include a copy of the infection
The Process is packed and/or encrypted using a software packing process
The process hooks code into all running processes which could allow it to take control of the system or record keyboard input, mouse activity and screen contents
This Process Deletes Other Processes From Disk
Adds a Registry Key (RUN) to auto start Programs on system start up
Writes to another Process's Virtual Memory (Process Hijacking)
Registers a Dynamic Link Library File
READER_S.EXE has been the subject of the following behavior:
Executed as a Process
Created as a process on disk
Added as a Registry auto start to load Program on Boot up
Deleted as a process from disk
Has code inserted into its Virtual Memory space by other programs
Country Of Origin
The filename READER_S.EXE was first seen on Nov 28 2008 in the following geographical regions of the Prevx community:
COTE D'IVOIRE on Nov 28 2008
SPAIN on Dec 15 2008
The UNITED KINGDOM on Feb 21 2009
ITALY on Mar 4 2009
File Name Aliases
READER_S.EXE can also use the following file names:
93440296.TMP 9.TMP 77437591.TXT 33.TMP 71840708.SVD 35199105.DAT 1D.TMP 8.TMP C.TMP 32.TMP 97046672.EXE 16271226.EXE READER_SX.EXE READER_SZ.EXE READER_S

.EXE Filesizes
The following file size has been seen:
27,136 bytes 47,104 bytes 93,184 bytes 30,208 bytes 116,224 bytes 33,280 bytes 1,064,960 bytes Vendor, Product and Version Information
Files with the name READER_S.EXE have been seen to have the following Vendor, Product and Version Information in the file header:
Adobe Systems Incorporated; Adobe Reader 8.1; 8.1.0.2007051100
Microsoft Corporation; Message Queuing Service; 5.2.2003.3959 (srv03_sp2_rtm.070216-1710)
Sigmatel; ; 1.00.4197
File Type
The filename READER_S.EXE refers to many versions of an executable program.
File Activity
One or more files with the name READER_S.EXE creates, deletes, copies or moves the following files and folders:
Creates c:\windows\system32\reader_s.exe
Creates c:\documents and settings\user\reader_s.exe
Creates c:\docume~1\user\locals~1\temp\BNB.tmp
Creates c:\windows\system32\dllcache\ndis.sys
Creates c:\windows\system32\drivers\ndis.sys
Opens/modifes c:\autoexec.bat
Deletes c:\documents and settings\user\cookies\user@msn[2].txt
Deletes c:\documents and settings\user\cookies\
[email protected]
Deletes c:\documents and settings\user\cookies\
[email protected]
Deletes c:\documents and settings\user\cookies\user@atdmt[1].txt
Creates c:\windows\system32\drivers\restore.sys
Deletes c:\windows\system32\drivers\restore.sys
Deletes c:\program files\windows live\messenger\MsnMsgr.Exe"
Moves c:\program files\windows live\messenger\MsnMsgr.Exe" to c:\program files\windows live\messenger\MsnMsgr.Exe"
Deletes c:\docume~1\user\locals~1\temp\BNB.tmp
Registry Activity
One or more files with the name READER_S.EXE creates or modifies the following registry keys and values:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run reader_s C:\Documents and Settings\user\reader_s.exe HKEY_CURRENT_USER\AppEvents\Schemes\Apps\Explorer\Navigating\.Current [REG_EXPAND_SZ, value: ] HKEY_CURRENT_USER\AppEvents\Schemes\Apps\Explorer\Navigating\.Default [REG_EXPAND_SZ, value: ] HKEY_CURRENT_USER\AppEvents\Schemes\Apps\Explorer\BlockedPopup\.current HKEY_CURRENT_USER\AppEvents\Schemes\Apps\Explorer\BlockedPopup\.default [REG_EXPAND_SZ, value: ] HKEY_CURRENT_USER\AppEvents\Schemes\Apps\.Default\SystemAsterisk\.Current [REG_EXPAND_SZ, value: ] HKEY_CURRENT_USER\AppEvents\Schemes\Apps\.Default\SystemAsterisk\.Default [REG_EXPAND_SZ, value: ] HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings WarnonZoneCrossing value: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\New Windows PopupMgr no Network Activity
One or more files with the name READER_S.EXE performs the following network events:
DNS name server2.14.235.9
DNS name server6.249.93.9
Website Activity
One or more files with the name READER_S.EXE interacts with the following web sites and pages. Web addresses have been deliberately modified to prevent unintentional use.
Port 80 IP:222.138.109.32
TCP:72.14.235.9:53 Port:12
TCP:67.215.1.2:3842 Port:19
TCP:65.54.244.8:25 Port:19
TCP:64.12.139.249:25 Port:19
TCP:217.72.192.149:25 Port:19
TCP:67.195.168.31:25 Port:19
TCP:209.85.135.27:25 Port:19
TCP:66.249.93.9:53 Port:12
TCP:66.45.246.146:3120 Port:19
TCP:67.195.168.31:25 Port:19
TCP:65.54.244.8:25 Port:22
TCP:64.12.139.249:25 Port:22
TCP:217.72.192.149:25 Port:22
TCP:209.85.135.114:25 Port:22
TCP:67.215.9.66:3893 Port:19
TCP:67.195.168.31:25 Port:20
TCP:65.54.244.8:25 Port:22
TCP:64.12.139.249:25 Port:22
TCP:217.72.192.149:25 Port:22
TCP:209.85.135.114:25 Port:22
216 .195 .58 .113:2085 / ?bot_id=0&mode=1
TCP:216.195.58.113:2085 Port:17
TCP:216.195.58.113:2085 Port:18
sys371 .3fn .net:2084 / ?bot_id=0&mode=1
TCP:216.195.62.100:2084 Port:17
TCP:216.195.62.100:2084 Port:17
bu Prevx CSI aldığım.
Kafayı yiyicem sistem32 dosyası virüs kaynıyor. Altta verdiğim virüs isimlerinden bazısı çıktı. Reader_s sistem dosyalarının değiştirip kendi virüs dosyalarını koyuyor. Avast ile tarattım karantina doldu. ingilizcem olmadığı için sizin yorumlarınızı bekliyorum.
ThreatExpert's awareness of the file "reader_s.exe":
Across all ThreatExpert reports, the file "reader_s.exe" has always been identified as a threat.
File "reader_s.exe" has the following statistics:
Total number of reports analysed 443,750
Number of cases that involved the file "reader_s.exe" 179
Number of incidents when this file was found to be a threat 179
Statistical volume of cases when "reader_s.exe" was a threat 100%
Notes:
Please note that the name of the file should NOT be used to define if it is legitimate or not. Such determination can only be made by observing its dynamic behaviour.
In order to check a file, please submit it to ThreatExpert.
For a comprehensive pro-active protection against threats, please consider ThreatFire - our behavioral antivirus solution.
The file "reader_s.exe" is known to be created under the following filenames:
%System%\reader_s.exe
%UserProfile%\reader_s.exe
Notes:
%System% is a variable that refers to the System folder. By default, this is C:\Windows\System (Windows 95/98/Me), C:\Winnt\System32 (Windows NT/2000), or C:\Windows\System32 (Windows XP).
%UserProfile% is a variable that specifies the current user's profile folder. By default, this is C:\Documents and Settings\[UserName] (Windows NT/2000/XP).
The following threats are known to be associated with the file "reader_s.exe":
Threat Alias Number of Incidents
W32.Virut.CF [Symantec] 54
W32/Virut.gen [McAfee] 53
W32/Scribble-A [Sophos] 52
Virus:Win32/Virut.BM [Microsoft] 50
W32/Vetor-A [Sophos] 49
Virus.Win32.Virut.ce [Kaspersky Lab] 46
W32/Virut-Gen [Sophos] 39
W32/Virut.j [McAfee] 38
W32.Virut.W [Symantec] 37
Virus.Win32.Virut.n [Kaspersky Lab] 32
W32.Virut.U [Symantec] 29
Win32.Virut.Gen.5 [PC Tools] 29
PE_VIRUT.AP [Trend Micro] 28
Virus:Win32/Virut.BI [Microsoft] 28
W32/Virut.n [McAfee] 28
Win32.Virut.Gen [PC Tools] 26
Virus.Win32.Virut.q [Kaspersky Lab] 21
W32.Virut.B [Symantec] 20
New Win32 [McAfee] 18
Virus.Win32.Cheburgen.a [Ikarus] 18
Virus:Win32/Virut.AK [Microsoft] 18
Trojan-Downloader.Win32.VB.bbi [Ikarus] 17
PE_VIRUT.D [Trend Micro] 16
PE_VIRUT.XO [Trend Micro] 15
Virus.Win32.Virut.bw [Kaspersky Lab] 15
Virus:Win32/Virut.AP [Microsoft] 13
Win32.Virut.U [Ikarus] 13
Trojan-Dropper.Win32.Cutwail [Ikarus] 12
TrojanDropper:Win32/Cutwail.AL [Microsoft] 12
Virus.Win32.Virut [Ikarus] 12
Generic Downloader.x [McAfee] 9
Trojan Horse [Symantec] 9
Mal/Generic-A [Sophos] 8
PE_VIRUT.XP [Trend Micro] 8
Mal/Pushdo-A [Sophos] 7
Virus.Win32.Virut.bu [Kaspersky Lab] 7
New Win32.g4 [McAfee] 6
PE_VIRUT.BA [Trend Micro] 6
PE_VIRUX.A-1 [Trend Micro] 6
Trojan.Pandex [Symantec] 6
TrojanDownloader:Win32/Cutwail.gen!C [Microsoft] 6
Trojan-Dropper.Win32.Agent.afvt [Kaspersky Lab] 6
Virus.Win32.Virut.au [Ikarus] 6
Virus.Win32.Virut.bv [Kaspersky Lab] 6
Virus.Win32.Virut.bx [Kaspersky Lab] 6
Virus:Win32/Virut.AU [Microsoft] 6
Generic Dropper [McAfee] 4
PE_SALITY.EN-1 [Trend Micro] 4
PE_VIRUT.XL [Trend Micro] 4
Trojan.Win32.Pakes [Ikarus] 4
Trojan.Win32.Pakes.may [Kaspersky Lab] 4
TrojanDownloader:Win32/Cutwail.AG [Microsoft] 4
Trojan-Dropper.Agent [Ikarus] 4
Virus.Win32.Sality.aa [Kaspersky Lab] 4
Virus.Win32.Virut.bi [Ikarus] 4
Virus.Win32.Virut.o [Ikarus] 4
Virus.Win32.Virut.q [Ikarus] 4
Virus:Win32/Sality.AM [Microsoft] 4
Virus:Win32/Virut.AE [Microsoft] 4
Virus:Win32/Virut.AF [Microsoft] 4
Virus:Win32/Virut.AR [Microsoft] 4
W32.Sality.AE [Symantec] 4
W32.Virut.R [Symantec] 4
W32/Sality.al [McAfee] 4
W32/Sality-AM [Sophos] 4
PE_VIRUT.LJ [Trend Micro] 3
Trojan-Downloader.Win32.Pakernat.A [Ikarus] 3
Virus.Win32.Virut.bq [Kaspersky Lab] 3
Virus:Win32/Virut.BG [Microsoft] 3
Backdoor.Win32.Small.hnz [Kaspersky Lab] 2
Cutwail [McAfee] 2
PE_VIRUT.NZY [Trend Micro] 2
PE_VIRUT.XI [Trend Micro] 2
PE_VIRUT.XK [Trend Micro] 2
PE_VIRUT.XS [Trend Micro] 2
Trojan.Horse.AZT [Ikarus] 2
Trojan.Pandex!sd6 [PC Tools] 2
Trojan.Win32.Agent [Ikarus] 2
Trojan.Win32.Agent.bacu [Kaspersky Lab] 2
Trojan.Win32.Inject [Ikarus] 2
Trojan.Win32.Inject.mtr [Kaspersky Lab] 2
Trojan.Win32.Inject.mts [Kaspersky Lab] 2
Trojan.Win32.Inject.myj [Kaspersky Lab] 2
Trojan-Downloader.Agent!sd6 [PC Tools] 2
Trojan-Downloader.Win32.Agent.bhjw [Kaspersky Lab] 2
Trojan-Downloader.Win32.FraudLoad.dlv [Kaspersky Lab] 2
Trojan-Downloader.Win32.Small [Ikarus] 2
Virus.Win32.Sality [Ikarus] 2
Virus.Win32.Virut.bo [Kaspersky Lab] 2
Virus:Win32/Virut.AG [Microsoft] 2
Virus:Win32/Virut.AN [Microsoft] 2
Virus:Win32/Virut.BC [Microsoft] 2
Virus:Win32/Virut.D [Microsoft] 2
Virus:Win32/Virut.dam [Microsoft] 2
Virus:Win32/Virut.K [Microsoft] 2
Virus:Win32/Virut.L [Microsoft] 2
W32.Sality.Y [Ikarus] 2
W32.Virut.H [Symantec] 2
W32/Virut.remnants [McAfee] 2
W32/Virut-L [Sophos] 2