Spyware.Winvest

Printer Friendly Page

Updated: February 13, 2007 11:38:04 AM
Type: Spyware
Version: 2.3
Publisher: Tropical Software
Risk Impact: High
File Names: winvestigator.exe wv.exe sysninit.dll syswvnt.dll syswvh.dll loaddll.exe syswvwin.dll syswv
Systems Affected: Windows

Behavior


Spyware.Winvest is a program that:

    • Logs keystrokes
    • Captures screenshots
    • Transfers logs via email
    • Monitors in stealth mode


Symptoms


Your Symantec program detects Spyware.Winvest.

Transmission


Spyware.Winvest must be manually installed.

Antivirus Protection Dates

  • Initial Rapid Release version October 02, 2014 revision 022
  • Latest Rapid Release version September 03, 2017 revision 019
  • Initial Daily Certified version July 09, 2004
  • Latest Daily Certified version September 04, 2017 revision 002
  • Initial Weekly Certified release date July 14, 2004

Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.

Updated: February 13, 2007 11:38:04 AM
Type: Spyware
Version: 2.3
Publisher: Tropical Software
Risk Impact: High
File Names: winvestigator.exe wv.exe sysninit.dll syswvnt.dll syswvh.dll loaddll.exe syswvwin.dll syswv
Systems Affected: Windows


When Spyware.Winvest is installed, it performs the following actions:

  1. Creates the following files:
    • %ProgramFiles%\wv\wvh.dll - Used to display manual.
    • %ProgramFiles%\wv\wvres.dll - Used to display help file.
    • %ProgramFiles%\wv\wv.exe - The main application for configuring and log viewing.
    • %ProgramFiles%\wv\viewer.wv - Text file indicating viewer-only installation.
    • %ProgramFiles%\wv\un.exe - Generic uninstaller.
    • %ProgramFiles%\wv\wvlg - Log file.
    • %ProgramFiles%\wv\FILE_ID.DIZ - Program identification information.
    • %ProgramFiles%\wv\Trop.url - Link to Tropical Software website.
    • %ProgramFiles%\wv\winvestigator.xml - Program identification information.
    • %ProgramFiles%\wv\README.TXT - Documentation.
    • %Windir%\sysninit.dll - Used for logging Internet activity.
    • %Windir%\spoder.dll - The Microsoft Winsock2 reorder service.
    • %Windir%\syswvnt.dll - Used for logging Internet activity.
    • %Windir%\syswvh.dll - Used to start/stop logging.
    • %Windir%\loaddll.exe - Loads correct DLLs to monitor the computer.
    • %Windir%\syswvwin.dll - Used by loaddll.dll.
    • %Windir%\syswvmail.dll - Used to send logs via email.
    • %Windir%\loaddll.dll - Used by loaddll.exe.
    • %Windir%\gerevniw.Dvw
    • C:\Documents and Settings\Administrator\Start Menu\Programs\Winvestigator\Winvestigator.lnk - Start menu link.
    • C:\Documents and Settings\Administrator\Desktop\Winvestigator.lnk - Start menu link.
    • C:\Documents and Settings\Administrator\Start Menu\Programs\Winvestigator\Tropical Software Website.lnk - Start menu link.
    • C:\Documents and Settings\Administrator\Start Menu\Programs\Winvestigator\Readme.lnk - Start menu link.

      Note:
    • %ProgramFiles% is a variable that refers to the path to the program files folder. By default, this is C:\Program Files.
    • %Windir% is a variable. By default, this is C:\Windows or C:\Winnt.

  2. Adds the value:

    "loaddll" = "loaddll.exe"

    to the registry key:

    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

    so that the spyware runs when you start Windows.

  3. Adds the value:

    "(Default)" = "C:\Program Files\wv\wv.exe"

    to the registry key:

    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\wv.exe

  4. Adds the keys:

    HKEY_CLASSES_ROOT\.send
    HKEY_CLASSES_ROOT\wvFile
    HKEY_CURRENT_USER\Software\tropsoft
    HKEY_LOCAL_MACHINE\Software\tropsoft
    HKEY_LOCAL_MACHINE\Software\Microsoft\wvsys
    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\Winvestigator


Updated: February 13, 2007 11:38:04 AM
Type: Spyware
Version: 2.3
Publisher: Tropical Software
Risk Impact: High
File Names: winvestigator.exe wv.exe sysninit.dll syswvnt.dll syswvh.dll loaddll.exe syswvwin.dll syswv
Systems Affected: Windows


The following instructions pertain to all Symantec antivirus products that support Security Risk detection.


Note: The uninstaller of the Spyware can be accessed through the main configuration application %ProgramFiles%\wv\wv.exe. Accessing the application requires a password (default password is "winvestigator").
  1. Update the definitions.
  2. Restart the computer in Safe mode.
  3. Run a full system scan and delete all the files detected as Spyware.Winvest.
  4. Delete the values that were added to the registry.
For specific details on each of these steps, read the following instructions.

1. Updating the definitions
To obtain the most recent definitions, start your Symantec program and run LiveUpdate.

2. To restart the computer in Safe mode
Shut down the computer and turn off the power. Wait for at least 30 seconds, and then restart the computer in Safe mode or VGA mode. For instructions, read the document, "How to start the computer in Safe Mode . "

3. Scanning for and deleting the files
  1. Start Norton AntiVirus and make sure that it is configured to scan all the files. For more information, read the document, "How to configure Norton AntiVirus to scan all files."
  2. Run a full system scan.
  3. If any files are detected as Spyware.Winvest, click Delete.

    Note: If your Symantec antivirus product reports that it cannot delete a detected file, write down the path and file names. Then use Windows Explorer to locate and delete the file.
4. Deleting the value from the registry

WARNING: Symantec strongly recommends that you back up the registry before making any changes to it. Incorrect changes to the registry can result in permanent data loss or corrupted files. Modify the specified keys only. Read the document, "How to make a backup of the Windows registry ," for instructions.

Note: This is done to make sure that all the keys are removed. They may not be there if the uninstaller removed them.
  1. Click Start, and then click Run. (The Run dialog box appears.)
  2. Type regedit then click OK. (The Registry Editor opens.)
  3. Navigate to the key:

    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

  4. In the right pane, delete the value:

    "loaddll" = "loaddll.exe"

  5. Delete the subkey:

    HKEY_LOCAL_MACHINE\Software\tropsoft

  6. Navigate to the key:

    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths
  7. In the left pane, delete the subkey:

    wv.exe
  8. Navigate to the key:

    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall
  9. In the left pane, delete the subkey:

    Winvestigator
  10. Navigate to the key:

    HKEY_CLASSES_ROOT
  11. In the left pane, delete the subkeys:

    wvFile
    .send
  12. Navigate to the key:

    HKEY_LOCAL_MACHINE\Software\Microsoft

  13. In the left pane, delete the subkey:

    wvsys

  14. Navigate to the key:

    HKEY_CURRENT_USER\Software

  15. In the left pane, delete the subkey:

    Tropsoft

  16. Exit the Registry Editor.