Para el funcionamiento correcto del sitio web, debe activar el soporte de JavaScript en su navegador.
Win32.HLLW.Autoruner1.35590
Added to the Dr.Web virus database:
2013-04-25
Virus description added:
2013-05-01
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
[<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] '39396519fcb83bfbe916d216db0cb897' = '"%TEMP%\rar.exe" ..'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Facebook Update' = '"<LS_APPDATA>\Facebook\Update\FacebookUpdate.exe" /c /nocrashserver'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] '39396519fcb83bfbe916d216db0cb897' = '"%TEMP%\rar.exe" ..'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] '9fa6e11d4387f53602ce074613fe80b9' = '"%TEMP%\traCker.exe" ..'
[<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] '9fa6e11d4387f53602ce074613fe80b9' = '"%TEMP%\traCker.exe" ..'
Creates or modifies the following files:
%WINDIR%\Tasks\FacebookUpdateTaskUserS-1-5-21-2052111302-484763869-725345543-1003Core.job
%WINDIR%\Tasks\FacebookUpdateTaskUserS-1-5-21-2052111302-484763869-725345543-1003UA.job
%HOMEPATH%\Start Menu\Programs\Startup\9fa6e11d4387f53602ce074613fe80b9.exe
%HOMEPATH%\Start Menu\Programs\Startup\39396519fcb83bfbe916d216db0cb897.exe
Creates the following files on removable media:
<Drive name for removable media>:\9fa6e11d4387f53602ce074613fe80b9.exe.lnk
<Drive name for removable media>:\39396519fcb83bfbe916d216db0cb897.exe.lnk
<Drive name for removable media>:\9fa6e11d4387f53602ce074613fe80b9.exe
<Drive name for removable media>:\39396519fcb83bfbe916d216db0cb897.exe
Malicious functions:
To bypass firewall, removes or modifies the following registry keys:
[<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '%TEMP%\traCker.exe' = '%TEMP%\traCker.exe:*:Enabled:traCker.exe'
[<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '%TEMP%\rar.exe' = '%TEMP%\rar.exe:*:Enabled:rar.exe'
Creates and executes the following:
'<LS_APPDATA>\Facebook\Update\FacebookUpdate.exe' /ig "appguid={4703ba42-f411-4b24-b495-0e537dd9b3fd}&appname=Facebook%20Video%20Call%20Plug-In&needsadmin=False&lang=en&elevateonly=True"
'%TEMP%\GUM1.tmp\FacebookUpdate.exe' /install "appguid={4703ba42-f411-4b24-b495-0e537dd9b3fd}&appname=Facebook%20Video%20Call%20Plug-In&needsadmin=False&lang=en&elevateonly=True"
'<LS_APPDATA>\Facebook\Update\FacebookUpdate.exe' /c /nocrashserver
'<LS_APPDATA>\Facebook\Update\FacebookUpdate.exe' /RegServer
'%PROGRAM_FILES%\Company\NewProduct\FacebookVideoCallSetup_v1.2.205.0.exe'
'%TEMP%\traCker.exe'
'%APPDATA%\2.exe'
'%TEMP%\rar.exe'
'%APPDATA%\17 avril.exe'
Executes the following:
'%PROGRAM_FILES%\Internet Explorer\IEXPLORE.EXE' http://www.fa###ook.com/omaha/help.php?hl##################################################################################################################################################################################################################
'<SYSTEM32>\netsh.exe' firewall add allowedprogram "%TEMP%\rar.exe" "rar.exe" ENABLE
'<SYSTEM32>\netsh.exe' firewall add allowedprogram "%TEMP%\traCker.exe" "traCker.exe" ENABLE
Modifies file system :
Creates the following files:
Sets the 'hidden' attribute to the following files:
<Drive name for removable media>:\39396519fcb83bfbe916d216db0cb897.exe
<Drive name for removable media>:\9fa6e11d4387f53602ce074613fe80b9.exe
Deletes the following files:
%TEMP%\GUM1.tmp\goopdateres_pl.dll
%TEMP%\GUM1.tmp\goopdateres_or.dll
%TEMP%\GUM1.tmp\goopdateres_no.dll
%TEMP%\GUM1.tmp\goopdateres_pt-BR.dll
%TEMP%\GUM1.tmp\goopdateres_ru.dll
%TEMP%\GUM1.tmp\goopdateres_ro.dll
%TEMP%\GUM1.tmp\goopdateres_pt-PT.dll
%TEMP%\GUM1.tmp\goopdateres_nl.dll
%TEMP%\GUM1.tmp\goopdateres_lt.dll
%TEMP%\GUM1.tmp\goopdateres_ko.dll
%TEMP%\GUM1.tmp\goopdateres_kn.dll
%TEMP%\GUM1.tmp\goopdateres_lv.dll
%TEMP%\GUM1.tmp\goopdateres_ms.dll
%TEMP%\GUM1.tmp\goopdateres_mr.dll
%TEMP%\GUM1.tmp\goopdateres_ml.dll
%TEMP%\GUM1.tmp\goopdateres_vi.dll
%TEMP%\GUM1.tmp\goopdateres_ur.dll
%TEMP%\GUM1.tmp\goopdateres_uk.dll
%TEMP%\GUM1.tmp\goopdateres_zh-CN.dll
%TEMP%\$inst\2.tmp
%TEMP%\GUT2.tmp
%TEMP%\GUM1.tmp\goopdateres_zh-TW.dll
%TEMP%\GUM1.tmp\goopdateres_tr.dll
%TEMP%\GUM1.tmp\goopdateres_sr.dll
%TEMP%\GUM1.tmp\goopdateres_sl.dll
%TEMP%\GUM1.tmp\goopdateres_sk.dll
%TEMP%\GUM1.tmp\goopdateres_sv.dll
%TEMP%\GUM1.tmp\goopdateres_th.dll
%TEMP%\GUM1.tmp\goopdateres_te.dll
%TEMP%\GUM1.tmp\goopdateres_ta.dll
%TEMP%\GUM1.tmp\goopdateres_ja.dll
%TEMP%\GUM1.tmp\goopdateres_da.dll
%TEMP%\GUM1.tmp\goopdateres_cs.dll
%TEMP%\GUM1.tmp\goopdateres_ca.dll
%TEMP%\GUM1.tmp\goopdateres_de.dll
%TEMP%\GUM1.tmp\goopdateres_en-GB.dll
%TEMP%\GUM1.tmp\goopdateres_en.dll
%TEMP%\GUM1.tmp\goopdateres_el.dll
%TEMP%\GUM1.tmp\goopdateres_bn.dll
%TEMP%\GUM1.tmp\FacebookCrashHandler.exe
%TEMP%\GUM1.tmp\FacebookUpdate.exe
%TEMP%\$inst\temp_0.tmp
%TEMP%\GUM1.tmp\goopdate.dll
%TEMP%\GUM1.tmp\goopdateres_bg.dll
%TEMP%\GUM1.tmp\goopdateres_ar.dll
%TEMP%\GUM1.tmp\FacebookUpdateHelper.msi
%TEMP%\GUM1.tmp\goopdateres_hu.dll
%TEMP%\GUM1.tmp\goopdateres_hr.dll
%TEMP%\GUM1.tmp\goopdateres_hi.dll
%TEMP%\GUM1.tmp\goopdateres_id.dll
%TEMP%\GUM1.tmp\goopdateres_iw.dll
%TEMP%\GUM1.tmp\goopdateres_it.dll
%TEMP%\GUM1.tmp\goopdateres_is.dll
%TEMP%\GUM1.tmp\goopdateres_gu.dll
%TEMP%\GUM1.tmp\goopdateres_et.dll
%TEMP%\GUM1.tmp\goopdateres_es-419.dll
%TEMP%\GUM1.tmp\goopdateres_es.dll
%TEMP%\GUM1.tmp\goopdateres_fa.dll
%TEMP%\GUM1.tmp\goopdateres_fr.dll
%TEMP%\GUM1.tmp\goopdateres_fil.dll
%TEMP%\GUM1.tmp\goopdateres_fi.dll
Network activity:
Connects to:
'www.fa###ook.com':80
'www.fa###ook.com':443
'localhost':1075
'cr#####ackers.zapto.org':1177
'po####9.no-ip.biz':1177
'wp#d':80
TCP:
HTTP GET requests:
www.fa###ook.com/omaha/help.php?hl##################################################################################################################################################################################################################
wp#d/wpad.dat
HTTP POST requests:
www.fa###ook.com/omaha/update.php
UDP:
DNS ASK wp#d
DNS ASK www.fa###ook.com
DNS ASK cr#####ackers.zapto.org
DNS ASK po####9.no-ip.biz
Miscellaneous:
Searches for the following windows:
ClassName: 'MS_AutodialMonitor' WindowName: ''
ClassName: 'MS_WebcheckMonitor' WindowName: ''
ClassName: '' WindowName: ''
ClassName: 'Shell_TrayWnd' WindowName: ''
ClassName: 'Indicator' WindowName: ''
Descargue Dr.Web para Android
Gratis por 3 meses
Todos los componentes de protección
Renovación de la demo a través de AppGallery/Google Pay
Si Vd. continúa usando este sitio web, esto significa que Vd. acepta el uso de archivos Cookie y otras tecnologías para que recabemos las estadísticas sobre los visitantes. Más información
OK