Pour le fonctionnement correct du site, vous devez activer JavaScript dans votre navigateur.
Win32.HLLM.Reset.513
Added to the Dr.Web virus database:
2017-09-24
Virus description added:
2017-09-24
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe,,<LS_APPDATA>\jwaroevi\rarexsdb.exe'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'RarExsdb' = '<LS_APPDATA>\jwaroevi\rarexsdb.exe'
Creates or modifies the following files:
%HOMEPATH%\Start Menu\Programs\Startup\rarexsdb.exe
Malicious functions:
To bypass firewall, removes or modifies the following registry keys:
[<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile] 'DisableNotifications' = '00000001'
[<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile] 'DoNotAllowExceptions' = '00000000'
[<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile] 'EnableFirewall' = '00000000'
To complicate detection of its presence in the operating system,
blocks execution of the following system utilities:
Windows Update
Windows Security Center
blocks the following features:
User Account Control (UAC)
Windows Security Center
Creates and executes the following:
Executes the following:
Injects code into
the following system processes:
the following user processes:
Modifies file system:
Creates the following files:
%ALLUSERSPROFILE%\Application Data\ybfcuwpc.log
<LS_APPDATA>\lawhwilb.log
<LS_APPDATA>\jwaroevi\rarexsdb.exe
%TEMP%\byjjjqlf.exe
%TEMP%\ifqydaby.exe
Sets the 'hidden' attribute to the following files:
%HOMEPATH%\Start Menu\Programs\Startup\rarexsdb.exe
Network activity:
Connects to:
'wc#####tybhaxdhxxob.com':443
'gb####ecwora.com':443
'hx#####pwhlmrxmnx.com':443
'ho####slqfqju.com':443
'ti#####bvkipfueev.com':443
'el#####tnipymvdwt.com':443
'lp#####brlblgfmdq.com':443
'uj####aah61996y.com':443
'74.##5.232.51':80
'ni#####yaenashuuw.com':443
'vw#####qcrfupdkfphj.com':443
'pq###ocbv.com':443
UDP:
DNS ASK ee###rntf.com
DNS ASK et#####wqrdrsulbb.com
DNS ASK rj###lub.com
DNS ASK eq#####eavpcybkow.com
DNS ASK tq###ivxbii.com
DNS ASK cy####vocbxhuec.com
DNS ASK dr####xetonueb.com
DNS ASK el###wqqlw.com
DNS ASK ti###rokbf.com
DNS ASK wl#####vwjvgqfqjwre.com
DNS ASK hl####suaxxksfo.com
DNS ASK na#####wiwwdyeqg.com
DNS ASK jo###hkicas.com
DNS ASK ae#####oqvoqicyux.com
DNS ASK sv###oyush.com
DNS ASK iq###gxt.com
DNS ASK wd###pww.com
DNS ASK ew####dulsiidhp.com
DNS ASK hv#####pqelqtqcv.com
DNS ASK ym###hjju.com
DNS ASK md###ipm.com
DNS ASK gw#####qfyujpcdl.com
DNS ASK vl###qtq.com
DNS ASK cb#####obofpbhajsly.com
DNS ASK gd####yvcuvav.com
DNS ASK ay###mgnpb.com
DNS ASK el#####tnipymvdwt.com
DNS ASK wc#####tybhaxdhxxob.com
DNS ASK gb####ecwora.com
DNS ASK kl#####jjxvirgeh.com
DNS ASK ho####slqfqju.com
DNS ASK ti#####bvkipfueev.com
DNS ASK hx#####pwhlmrxmnx.com
DNS ASK lp#####brlblgfmdq.com
DNS ASK uj####aah61996y.com
DNS ASK google.com
DNS ASK ni#####yaenashuuw.com
DNS ASK vw#####qcrfupdkfphj.com
DNS ASK pq###ocbv.com
DNS ASK tt###fbgokb.com
DNS ASK nm#####sniyvvskpcp.com
DNS ASK el###elny.com
DNS ASK cp####hlmhsuucs.com
DNS ASK jp###qtu.com
DNS ASK lo###nisjsm.com
DNS ASK cs###ievc.com
DNS ASK pw###rhi.com
DNS ASK hh###hsb.com
DNS ASK jf#####ltqboplbv.com
DNS ASK gh####spdappp.com
DNS ASK lh####cgbnkj.com
DNS ASK ux####tkvsqvj.com
Téléchargez Dr.Web pour Android
Gratuit pour 3 mois
Tous les composants de protection
Renouvellement de la démo via AppGallery/Google Pay
Nous utilisons des cookies sur notre site web à des fins d’analyse et de récolte de données statistiques. En naviguant sur notre site, vous pouvez accepter ou refuser l’utilisation de ces fichiers cookies, sauf ceux strictement nécessaires au fonctionnement du site web.
En savoir plus : Politique de confidentialité
Accepter
Refuser