Per il corretto funzionamento del sito, è necessario attivare il supporto di JavaScript nel browser.
Win32.HLLW.Autoruner1.35736
Aggiunto al database dei virus Dr.Web:
2013-04-26
La descrizione è stata aggiunta:
2013-05-02
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
[<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Topology Desktop Remote Disk Thread' = '<SYSTEM32>\mhtoeyknykb.exe'
Creates the following services:
[<HKLM>\SYSTEM\ControlSet001\Services\CNG PC Source Firewall Access] 'Start' = '00000002'
Malicious functions:
To complicate detection of its presence in the operating system,
blocks the following features:
Creates and executes the following:
'%WINDIR%\Temp\enclrj5wv7lbaz.exe' -r 24649 tcp
'%WINDIR%\Temp\enclrj70jklbaz.exe' -r 33957 tcp
'<SYSTEM32>\fvoyafoxuj.exe' "<SYSTEM32>\mhtoeyknykb.exe"
'%TEMP%\enclrj4xp4lbaxdruogw.exe'
'<SYSTEM32>\mhtoeyknykb.exe'
Modifies file system :
Creates the following files:
<SYSTEM32>\vswbdiotokhmln\run
<SYSTEM32>\vswbdiotokhmln\rng
<SYSTEM32>\vswbdiotokhmln\cfg
%WINDIR%\Temp\enclrj70jklbaz.exe
%WINDIR%\Temp\enclrj5wv7lbaz.exe
%TEMP%\enclrj4xp4lbaxdruogw.exe
<SYSTEM32>\vswbdiotokhmln\tst
<SYSTEM32>\vswbdiotokhmln\etc
<SYSTEM32>\fvoyafoxuj.exe
<SYSTEM32>\mhtoeyknykb.exe
Sets the 'hidden' attribute to the following files:
<SYSTEM32>\fvoyafoxuj.exe
<SYSTEM32>\mhtoeyknykb.exe
Deletes the following files:
%WINDIR%\Temp\enclrj5wv7lbaz.exe
%WINDIR%\Temp\enclrj70jklbaz.exe
<DRIVERS>\etc\hosts
%TEMP%\enclrj4xp4lbaxdruogw.exe
Substitutes the HOSTS file.
Network activity:
Connects to:
'pa####ciostit.com':80
'ka####tixter.com':80
've####tistic.com':80
'jo###ryta.com':80
'gr####oholist.com':80
'gj####vcaouy.com':80
TCP:
HTTP GET requests:
pa####ciostit.com/so31/isup.php?v=###################
ka####tixter.com/so31/isup.php?v=###################
ve####tistic.com/so31/isup.php?v=###################
jo###ryta.com/so31/isup.php?v=###################
gr####oholist.com/so31/isup.php?v=###################
gj####vcaouy.com/so31/isup.php?v=###################
UDP:
DNS ASK fa######pulepunctcom.com
DNS ASK ge#####alixtentop.com
DNS ASK ka####tixter.com
DNS ASK af####chmonitor.com
DNS ASK ja###uter.com
DNS ASK wa####rbulldog.com
DNS ASK gr####oholist.com
DNS ASK jo###ryta.com
DNS ASK gj####vcaouy.com
DNS ASK ve####tistic.com
DNS ASK pa####ciostit.com
'23#.#55.255.250':1900
Scaricate Dr.Web per Android
Gratis per 3 mesi
Tutti i componenti di protezione
Rinnovo versione di prova tramite AppGallery/Google Pay
Continuando a utilizzare questo sito, l'utente acconsente al nostro utilizzo di file Cookie e di altre tecnologie per la raccolta di informazioni statistiche sui visitatori. Per maggiori informazioni
OK