Per il corretto funzionamento del sito, è necessario attivare il supporto di JavaScript nel browser.
Win32.HLLW.Autoruner2.26399
Aggiunto al database dei virus Dr.Web:
2016-11-03
La descrizione è stata aggiunta:
2016-11-03
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
[<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Dsnsjsob' = '<SYSTEM32>\dsmmfoqk.exe'
Creates the following services:
[<HKLM>\SYSTEM\ControlSet001\Services\Oxnxghpc] 'ImagePath' = '<SYSTEM32>\dsmmfoqk.exe'
[<HKLM>\SYSTEM\ControlSet001\Services\Oxnxghpc] 'Start' = '00000002'
Malicious functions:
To complicate detection of its presence in the operating system,
blocks the following features:
Executes the following:
'<SYSTEM32>\qfzzsbdx.exe' "<SYSTEM32>\dsmmfoqk.exe"
'%WINDIR%\Temp\aohoms3jw6kd.exe' -r 36223 tcp
'%TEMP%\aohoms3er9kz04k0ucb.exe'
'<SYSTEM32>\dsmmfoqk.exe'
Modifies file system:
Creates the following files:
<SYSTEM32>\40294107\run
<SYSTEM32>\40294107\rng
%WINDIR%\Temp\aohoms3jw6kd.exe
<SYSTEM32>\40294107\cfg
<SYSTEM32>\qfzzsbdx.exe
%TEMP%\aohoms3er9kz04k0ucb.exe
<SYSTEM32>\40294107\tst
<SYSTEM32>\dsmmfoqk.exe
<SYSTEM32>\40294107\etc
Sets the 'hidden' attribute to the following files:
<SYSTEM32>\qfzzsbdx.exe
<SYSTEM32>\dsmmfoqk.exe
Deletes the following files:
%WINDIR%\Temp\aohoms3jw6kd.exe
<DRIVERS>\etc\hosts
%TEMP%\aohoms3er9kz04k0ucb.exe
Substitutes the HOSTS file.
Network activity:
Connects to:
'ma#####ousestoday.com':80
'me#####gintheway.com':80
'pe####ersonals.com':80
'bl#####eronredmoon.com':80
'tr###entral.net':80
'ch####rsdolist.com':80
'de###batten.com':80
'ad#####edmtleaps.com':80
'tr###telist.com':80
'hi###anblog.com':80
'tr###entral.com':80
'tr###telost.com':80
'jo###ryta.com':80
'co####ertosar.com':80
'oa####vomurates.com':80
TCP:
HTTP GET requests:
http://ma#####ousestoday.com/so31/isup.php?v=##################
http://me#####gintheway.com/so31/isup.php?v=##################
http://pe####ersonals.com/so31/isup.php?v=##################
http://bl#####eronredmoon.com/so31/isup.php?v=##################
http://tr###entral.net/so31/isup.php?v=##################
http://ch####rsdolist.com/so31/isup.php?v=##################
http://de###batten.com/so31/isup.php?v=##################
http://ad#####edmtleaps.com/so31/isup.php?v=##################
http://tr###telist.com/so31/isup.php?v=##################
http://hi###anblog.com/so31/isup.php?v=##################
http://tr###entral.com/so31/isup.php?v=##################
http://tr###telost.com/so31/isup.php?v=##################
http://jo###ryta.com/so31/isup.php?v=##################
http://co####ertosar.com/so31/isup.php?v=##################
http://oa####vomurates.com/so31/isup.php?v=##################
UDP:
DNS ASK me#####gintheway.com
DNS ASK ma#####ousestoday.com
DNS ASK ad#####edmtleaps.com
DNS ASK pe####ersonals.com
DNS ASK ch####rsdolist.com
DNS ASK tr###entral.net
DNS ASK bl#####eronredmoon.com
DNS ASK de###batten.com
DNS ASK tr###telist.com
DNS ASK hi###anblog.com
DNS ASK tr###entral.com
DNS ASK tr###telost.com
DNS ASK jo###ryta.com
DNS ASK co####ertosar.com
DNS ASK oa####vomurates.com
'23#.#55.255.250':1900
Scaricate Dr.Web per Android
Gratis per 3 mesi
Tutti i componenti di protezione
Rinnovo versione di prova tramite AppGallery/Google Pay
Continuando a utilizzare questo sito, l'utente acconsente al nostro utilizzo di file Cookie e di altre tecnologie per la raccolta di informazioni statistiche sui visitatori. Per maggiori informazioni
OK