Per il corretto funzionamento del sito, è necessario attivare il supporto di JavaScript nel browser.
Win32.HLLW.Autoruner2.23185
Aggiunto al database dei virus Dr.Web:
2016-02-16
La descrizione è stata aggiunta:
2016-02-16
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
[<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Logon Connect Registrar Key' = '<SYSTEM32>\thtqopk.exe'
Creates the following services:
[<HKLM>\SYSTEM\ControlSet001\Services\Driver Backup Tablet User-mode] 'ImagePath' = '<SYSTEM32>\thtqopk.exe'
[<HKLM>\SYSTEM\ControlSet001\Services\Driver Backup Tablet User-mode] 'Start' = '00000002'
Malicious functions:
To complicate detection of its presence in the operating system,
blocks the following features:
Creates and executes the following:
'<SYSTEM32>\acbqxubmqxq.exe' "<SYSTEM32>\thtqopk.exe"
'%WINDIR%\Temp\PNGDINWV3EWWCY.EXE' -r 33228 tcp
'%TEMP%\PNGDINWV38NNCWXLFT7PB.EXE'
'<SYSTEM32>\thtqopk.exe'
Modifies file system:
Creates the following files:
<SYSTEM32>\hcsmfjmhnqa\run
<SYSTEM32>\hcsmfjmhnqa\rng
%WINDIR%\Temp\PNGDINWV3EWWCY.EXE
<SYSTEM32>\hcsmfjmhnqa\cfg
<SYSTEM32>\acbqxubmqxq.exe
%TEMP%\PNGDINWV38NNCWXLFT7PB.EXE
<SYSTEM32>\hcsmfjmhnqa\tst
<SYSTEM32>\thtqopk.exe
<SYSTEM32>\hcsmfjmhnqa\etc
Sets the 'hidden' attribute to the following files:
<SYSTEM32>\acbqxubmqxq.exe
<SYSTEM32>\thtqopk.exe
Deletes the following files:
%WINDIR%\Temp\PNGDINWV3EWWCY.EXE
<DRIVERS>\etc\hosts
Substitutes the HOSTS file.
Network activity:
Connects to:
'me#####gintheway.com':80
'pe####ersonals.com':80
'ma#####ousestoday.com':80
'tr###entral.net':80
'bl#####eronredmoon.com':80
'ad#####edmtleaps.com':80
'hi###anblog.com':80
'tr###entral.com':80
'tr###telist.com':80
'oa####vomurates.com':80
'tr###telost.com':80
TCP:
HTTP GET requests:
http://me#####gintheway.com/so31/isup.php?v=##################
http://pe####ersonals.com/so31/isup.php?v=##################
http://ma#####ousestoday.com/so31/isup.php?v=##################
http://tr###entral.net/so31/isup.php?v=##################
http://bl#####eronredmoon.com/so31/isup.php?v=##################
http://ad#####edmtleaps.com/so31/isup.php?v=##################
http://hi###anblog.com/so31/isup.php?v=##################
http://tr###entral.com/so31/isup.php?v=##################
http://tr###telist.com/so31/isup.php?v=##################
http://oa####vomurates.com/so31/isup.php?v=##################
http://tr###telost.com/so31/isup.php?v=##################
UDP:
DNS ASK me#####gintheway.com
DNS ASK pe####ersonals.com
DNS ASK ad#####edmtleaps.com
DNS ASK tr###entral.net
DNS ASK bl#####eronredmoon.com
DNS ASK ma#####ousestoday.com
DNS ASK hi###anblog.com
DNS ASK tr###entral.com
DNS ASK tr###telist.com
DNS ASK oa####vomurates.com
DNS ASK tr###telost.com
'23#.#55.255.250':1900
Scaricate Dr.Web per Android
Gratis per 3 mesi
Tutti i componenti di protezione
Rinnovo versione di prova tramite AppGallery/Google Pay
Continuando a utilizzare questo sito, l'utente acconsente al nostro utilizzo di file Cookie e di altre tecnologie per la raccolta di informazioni statistiche sui visitatori. Per maggiori informazioni
OK