Per il corretto funzionamento del sito, è necessario attivare il supporto di JavaScript nel browser.
Win32.HLLW.Phorpiex.916
Aggiunto al database dei virus Dr.Web:
2018-03-18
La descrizione è stata aggiunta:
2020-10-20
Technical Information
To ensure autorun and distribution
Sets the following service settings
[<HKLM>\System\CurrentControlSet\Services\VolumeDisk0] 'Start' = '00000002'
[<HKLM>\System\CurrentControlSet\Services\VolumeDisk0] 'ImagePath' = '%ALLUSERSPROFILE%\WindowsVolume\sysdisk.exe'
Creates the following services
'VolumeDisk0' %ALLUSERSPROFILE%\WindowsVolume\sysdisk.exe
Malicious functions
Executes the following
'%WINDIR%\syswow64\taskkill.exe' /im rfusclient.exe /f
'%WINDIR%\syswow64\taskkill.exe' /im rutserv.exe /f
Modifies file system
Creates the following files
%TEMP%\$inst\2.tmp
%ALLUSERSPROFILE%\windowsvolume\volumedisk.exe
%ALLUSERSPROFILE%\windowsvolume\vp8decoder.dll
%ALLUSERSPROFILE%\windowsvolume\russian.lg
%ALLUSERSPROFILE%\windowsvolume\diskupdate1.exe
%ALLUSERSPROFILE%\windowsvolume\diskinstall2.bat
%ALLUSERSPROFILE%\windowsvolume\diskinstall.bat
%ALLUSERSPROFILE%\windowsvolume\vp8encoder.dll
%ALLUSERSPROFILE%\windowsvolume\opendisk.exe
%ALLUSERSPROFILE%\windowsvolume\diskupdate.exe
%ALLUSERSPROFILE%\windowsvolume\config_set.reg
%ALLUSERSPROFILE%\windowsvolume\diskserver.exe
%ALLUSERSPROFILE%\windowsvolume\file3.exe
%ALLUSERSPROFILE%\windowsvolume\file2.exe
%ALLUSERSPROFILE%\windowsvolume\file.exe
%TEMP%\$inst\temp_0.tmp
%ALLUSERSPROFILE%\windowsvolume\sysdisk.exe
%ALLUSERSPROFILE%\windowsvolume\diskpart.dat
Sets the 'hidden' attribute to the following files
%ALLUSERSPROFILE%\windowsvolume\diskinstall.bat
%ALLUSERSPROFILE%\windowsvolume\diskpart.dat
%ALLUSERSPROFILE%\windowsvolume\diskserver.exe
%ALLUSERSPROFILE%\windowsvolume\file.exe
%ALLUSERSPROFILE%\windowsvolume\file2.exe
%ALLUSERSPROFILE%\windowsvolume\file3.exe
%ALLUSERSPROFILE%\windowsvolume\opendisk.exe
%ALLUSERSPROFILE%\windowsvolume\russian.lg
%ALLUSERSPROFILE%\windowsvolume\sysdisk.exe
%ALLUSERSPROFILE%\windowsvolume\volumedisk.exe
%ALLUSERSPROFILE%\windowsvolume\vp8decoder.dll
%ALLUSERSPROFILE%\windowsvolume\vp8encoder.dll
Deletes the following files
%TEMP%\$inst\temp_0.tmp
%TEMP%\$inst\2.tmp
%ALLUSERSPROFILE%\windowsvolume\config_set.reg
%ALLUSERSPROFILE%\windowsvolume\diskupdate.exe
%ALLUSERSPROFILE%\windowsvolume\diskupdate1.exe
%ALLUSERSPROFILE%\windowsvolume\diskinstall2.bat
Network activity
TCP
HTTP GET requests
http://rm##sys.ru/utils/inet_id_notify.php?te####
'rm#####ver.tektonit.ru':5655
UDP
DNS ASK rm##sys.ru
DNS ASK rm#####ver.tektonit.ru
Miscellaneous
Searches for the following windows
ClassName: 'EDIT' WindowName: ''
ClassName: 'MS_WINHELP' WindowName: ''
ClassName: '' WindowName: ''
ClassName: 'RegEdit_RegEdit' WindowName: ''
Creates and executes the following
'%ALLUSERSPROFILE%\windowsvolume\diskserver.exe' -p834784734789789347892898943789787892
'%ALLUSERSPROFILE%\windowsvolume\opendisk.exe'
'%ALLUSERSPROFILE%\windowsvolume\file.exe'
'%ALLUSERSPROFILE%\windowsvolume\file2.exe'
'%ALLUSERSPROFILE%\windowsvolume\file3.exe'
'%ALLUSERSPROFILE%\windowsvolume\diskupdate.exe' -p78347834893489894237834783478785788989543536
'%ALLUSERSPROFILE%\windowsvolume\diskupdate1.exe'
'%ALLUSERSPROFILE%\windowsvolume\sysdisk.exe' /silentinstall
'%ALLUSERSPROFILE%\windowsvolume\sysdisk.exe' /firewall
'%ALLUSERSPROFILE%\windowsvolume\sysdisk.exe' /start
'%ALLUSERSPROFILE%\windowsvolume\sysdisk.exe'
'%ALLUSERSPROFILE%\windowsvolume\volumedisk.exe'
'%ALLUSERSPROFILE%\windowsvolume\volumedisk.exe' /tray
'%ALLUSERSPROFILE%\windowsvolume\diskupdate.exe' -p78347834893489894237834783478785788989543536' (with hidden window)
'%WINDIR%\syswow64\cmd.exe' /c ""%ALLUSERSPROFILE%\WindowsVolume\DiskInstall.bat" "' (with hidden window)
Executes the following
'%WINDIR%\syswow64\cmd.exe' /c ""%ALLUSERSPROFILE%\WindowsVolume\DiskInstall.bat" "
'%WINDIR%\syswow64\sc.exe' failure VolumeDisk0 reset= 0 actions= restart/500/restart/500/restart/500
'%WINDIR%\syswow64\regedit.exe' /s "%ALLUSERSPROFILE%\WindowsVolume\config_set.reg"
'%WINDIR%\syswow64\reg.exe' delete "HKLM\SYSTEM\SystemVolume0\SysHardDisk" /f
'%WINDIR%\syswow64\sc.exe' delete AMIHardware
'%WINDIR%\syswow64\sc.exe' delete IntelDriver
'%WINDIR%\syswow64\sc.exe' delete ServiceWork
'%WINDIR%\syswow64\sc.exe' delete NPackStereo
'%WINDIR%\syswow64\sc.exe' delete VDeviceCard
'%WINDIR%\syswow64\sc.exe' config VolumeDisk0 obj= LocalSystem type= interact type= own
'%WINDIR%\syswow64\sc.exe' delete VolumeDisk0
'%WINDIR%\syswow64\sc.exe' stop AMIHardware
'%WINDIR%\syswow64\sc.exe' stop IntelDriver
'%WINDIR%\syswow64\sc.exe' stop ServiceWork
'%WINDIR%\syswow64\sc.exe' stop NPackStereo
'%WINDIR%\syswow64\sc.exe' stop VDeviceCard
'%WINDIR%\syswow64\sc.exe' stop VolumeDisk0
'%WINDIR%\syswow64\sc.exe' stop RManService
'%WINDIR%\syswow64\attrib.exe' +s +h "%ALLUSERSPROFILE%\WindowsVolume"
'%WINDIR%\syswow64\sc.exe' delete RManService
'%WINDIR%\syswow64\attrib.exe' +s +h "%ALLUSERSPROFILE%\WindowsVolume\*.*"
Scaricate Dr.Web per Android
Gratis per 3 mesi
Tutti i componenti di protezione
Rinnovo versione di prova tramite AppGallery/Google Pay
Continuando a utilizzare questo sito, l'utente acconsente al nostro utilizzo di file Cookie e di altre tecnologie per la raccolta di informazioni statistiche sui visitatori. Per maggiori informazioni
OK