Per il corretto funzionamento del sito, è necessario attivare il supporto di JavaScript nel browser.
Win32.HLLM.Reset.491
Aggiunto al database dei virus Dr.Web:
2016-03-22
La descrizione è stata aggiunta:
2016-07-28
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'ByjJjqlf' = '%TEMP%\byjjjqlf.exe'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'RarExsdb' = '<LS_APPDATA>\jwaroevi\rarexsdb.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe,,<LS_APPDATA>\jwaroevi\rarexsdb.exe'
Creates or modifies the following files:
%HOMEPATH%\Start Menu\Programs\Startup\rarexsdb.exe
Malicious functions:
To bypass firewall, removes or modifies the following registry keys:
[<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile] 'DisableNotifications' = '00000001'
[<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile] 'DoNotAllowExceptions' = '00000000'
[<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile] 'EnableFirewall' = '00000000'
To complicate detection of its presence in the operating system,
blocks execution of the following system utilities:
Windows Update
Windows Security Center
blocks the following features:
Creates and executes the following:
Executes the following:
'<SYSTEM32>\svchost.exe'
'%TEMP%\byjjjqlf.exe'
Injects code into
the following system processes:
Modifies file system:
Creates the following files:
<LS_APPDATA>\jwaroevi\rarexsdb.exe
%TEMP%\ifqydaby.exe
<LS_APPDATA>\lawhwilb.log
%TEMP%\byjjjqlf.exe
%ALLUSERSPROFILE%\Application Data\ybfcuwpc.log
Sets the 'hidden' attribute to the following files:
%HOMEPATH%\Start Menu\Programs\Startup\rarexsdb.exe
Network activity:
Connects to:
'qa#####urmebijlnd.com':443
'en###pax.com':443
'bg###orpy.com':443
'gw#####secbnejofng.com':443
'uu###nsf.com':443
'ne###myfjth.com':443
'ww####nlhfllneb.com':443
'91.##7.104.175':443
'74.##5.232.51':80
'jw###tioead.com':443
'xq#####tpqbxixjp.com':443
'pk#####uudiqrmyyi.com':443
UDP:
DNS ASK xg####pjxsqknl.com
DNS ASK qr####bwqxsoh.com
DNS ASK gw#####secbnejofng.com
DNS ASK cw###rwkg.com
DNS ASK pt####pddptyy.com
DNS ASK ea###jvlfd.com
DNS ASK ip#####dubxckjmjcuv.com
DNS ASK wb####jkfkcpn.com
DNS ASK yy###skalki.com
DNS ASK uu###nsf.com
DNS ASK pk#####uudiqrmyyi.com
DNS ASK xq#####tpqbxixjp.com
DNS ASK google.com
DNS ASK ww####nlhfllneb.com
DNS ASK jw###tioead.com
DNS ASK qa#####urmebijlnd.com
DNS ASK ne###myfjth.com
DNS ASK bg###orpy.com
DNS ASK en###pax.com
Miscellaneous:
Searches for the following windows:
ClassName: 'Indicator' WindowName: ''
Scaricate Dr.Web per Android
Gratis per 3 mesi
Tutti i componenti di protezione
Rinnovo versione di prova tramite AppGallery/Google Pay
Continuando a utilizzare questo sito, l'utente acconsente al nostro utilizzo di file Cookie e di altre tecnologie per la raccolta di informazioni statistiche sui visitatori. Per maggiori informazioni
OK