Para el funcionamiento correcto del sitio web, debe activar el soporte de JavaScript en su navegador.
Win32.HLLW.Autoruner2.12019
Added to the Dr.Web virus database:
2014-07-30
Virus description added:
2014-08-12
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
[<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'a3753ba86393e79fa02d4b3a18e2fe9d' = '"%TEMP%\sist2e.exe" ..'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'a3753ba86393e79fa02d4b3a18e2fe9d' = '"%TEMP%\sist2e.exe" ..'
Creates or modifies the following files:
%HOMEPATH%\Start Menu\Programs\Startup\a3753ba86393e79fa02d4b3a18e2fe9d.exe
Creates the following services:
[<HKLM>\SYSTEM\ControlSet001\Services\GmPnSN] 'Start' = '00000002'
Malicious functions:
To bypass firewall, removes or modifies the following registry keys:
[<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '%TEMP%\sist2e.exe' = '%TEMP%\sist2e.exe:*:Enabled:sist2e.exe'
[<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '<SYSTEM32>\rgafbz.exe' = '<SYSTEM32>\rgafbz.exe:*:Enabled:Microsoft (R) Internetal IExplore'
Creates and executes the following:
'C:\Minecraft_v1.6.4.exe'
'<SYSTEM32>\rgafbz.exe'
'%TEMP%\sist2e.exe'
'%TEMP%\Minecraft_v1.6.4.exe'
'%TEMP%\°нµщµй ¤»¤»¤».exe'
'C:\patch.exe'
Executes the following:
'<SYSTEM32>\netsh.exe' firewall add allowedprogram "%TEMP%\sist2e.exe" "sist2e.exe" ENABLE
Searches for windows to
detect analytical utilities:
ClassName: 'FilemonClass' WindowName: '(null)'
ClassName: 'PROCMON_WINDOW_CLASS' WindowName: '(null)'
ClassName: 'RegmonClass' WindowName: '(null)'
ClassName: 'OLLYDBG' WindowName: '(null)'
ClassName: 'GBDYLLO' WindowName: '(null)'
ClassName: 'pediy06' WindowName: '(null)'
Modifies file system :
Creates the following files:
C:\Minecraft_v1.6.4.exe
<SYSTEM32>\rgafbz.exe
%TEMP%\sist2e.exe
%TEMP%\Minecraft_v1.6.4.exe
%TEMP%\°нµщµй ¤»¤»¤».exe
C:\patch.exe
Deletes the following files:
Network activity:
Connects to:
'fh####33.codns.com':1479
'dj#####jtm.no-ip.biz':8000
UDP:
DNS ASK fh####33.codns.com
DNS ASK dj#####jtm.no-ip.biz
Miscellaneous:
Searches for the following windows:
ClassName: '(null)' WindowName: 'Registry Monitor - Sysinternals: www.sysinternals.com'
ClassName: '18467-41' WindowName: '(null)'
ClassName: 'Indicator' WindowName: '(null)'
ClassName: 'Shell_TrayWnd' WindowName: '(null)'
ClassName: '(null)' WindowName: 'File Monitor - Sysinternals: www.sysinternals.com'
ClassName: '(null)' WindowName: 'Process Monitor - Sysinternals: www.sysinternals.com'
Descargue Dr.Web para Android
Gratis por 3 meses
Todos los componentes de protección
Renovación de la demo a través de AppGallery/Google Pay
Si Vd. continúa usando este sitio web, esto significa que Vd. acepta el uso de archivos Cookie y otras tecnologías para que recabemos las estadísticas sobre los visitantes. Más información
OK