Para el funcionamiento correcto del sitio web, debe activar el soporte de JavaScript en su navegador.
Win32.HLLW.Autohit.16205
Added to the Dr.Web virus database:
2017-03-01
Virus description added:
2017-03-01
Technical Information
To ensure autorun and distribution:
Creates or modifies the following files:
%HOMEPATH%\Start Menu\Programs\Startup\Microsoft Update.lnk
Malicious functions:
Executes the following:
'%TEMP%\soft.exesoft.exe'
'<SYSTEM32>\schtasks.exe' /Create /TN "Update\update" /XML "%TEMP%\z309"
'%APPDATA%\Zapo\xuryu.exe'
'%TEMP%\bot.exebot.exe'
'<SYSTEM32>\schtasks.exe' /Create /TN "Update\update" /XML "%TEMP%\z166"
'%TEMP%\APMCVS.exe'
'%TEMP%\MHZFFJ.exe'
'<SYSTEM32>\schtasks.exe' /Create /TN "Update\update" /XML "%TEMP%\z687"
'%TEMP%\QSCCKM.exe'
Injects code into
the following system processes:
a large number of user processes.
Searches for registry branches where third party applications store passwords:
[<HKCU>\Software\Microsoft\Internet Account Manager]
[<HKCU>\SOFTWARE\ftpware\coreftp\sites]
[<HKCU>\Software\Microsoft\Windows Live Mail]
[<HKCU>\Software\Microsoft\Internet Account Manager\Accounts]
[<HKLM>\SOFTWARE\martin prikryl\winscp 2\sessions]
[<HKCU>\SOFTWARE\Far\Plugins\ftp\hosts]
[<HKCU>\SOFTWARE\Ghisler\Total Commander]
[<HKCU>\SOFTWARE\martin prikryl\winscp 2\sessions]
[<HKCU>\SOFTWARE\Far2\Plugins\ftp\hosts]
Modifies settings of Windows Internet Explorer:
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4] '1A03' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4] '1A10' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3] '1A10' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3] '1A05' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings] 'WarnonBadCertRecving' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4] '1A06' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4] '1A05' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4] '1A02' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4] '1406' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3] '1406' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1] '1406' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1] '1609' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4] '1609' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3] '1609' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2] '1609' = '00000000'
Modifies file system:
Creates the following files:
%TEMP%\Cab1F.tmp
%TEMP%\Cab1D.tmp
%TEMP%\Cab23.tmp
%TEMP%\Cab21.tmp
%TEMP%\Cab1B.tmp
%TEMP%\Cab15.tmp
%TEMP%\Cab13.tmp
%TEMP%\Cab19.tmp
%TEMP%\Cab17.tmp
%TEMP%\Cab25.tmp
%TEMP%\bot.exebot.exe
%TEMP%\soft.exesoft.exe
<LS_APPDATA>\Identities\{5518F2FB-DB74-45A3-BEC1-4575D8D9DC84}\Microsoft\Outlook Express\Sent Items.dbx
%APPDATA%\Zapo\xuryu.exe
%TEMP%\z309
%APPDATA%\svchost
%TEMP%\Cab27.tmp
%TEMP%\z166
%TEMP%\z687
%TEMP%\aut4.tmp
%TEMP%\APMCVS.exe
%APPDATA%\Microsoft\CryptnetUrlCache\MetaData\2BF68F4714092295550497DD56F57004
%TEMP%\QSCCKM.exe
%TEMP%\aut3.tmp
%TEMP%\mmrfoft
%TEMP%\aut1.tmp
%TEMP%\MHZFFJ.exe
%TEMP%\aut2.tmp
%APPDATA%\Microsoft\CryptnetUrlCache\Content\2BF68F4714092295550497DD56F57004
%TEMP%\CabD.tmp
%TEMP%\CabB.tmp
%TEMP%\Cab11.tmp
%TEMP%\CabF.tmp
%TEMP%\Cab9.tmp
%APPDATA%\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
%APPDATA%\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
%TEMP%\Cab7.tmp
%TEMP%\Cab5.tmp
Sets the 'hidden' attribute to the following files:
%TEMP%\MHZFFJ.exe
%TEMP%\APMCVS.exe
Deletes the following files:
%TEMP%\Cab1B.tmp
%TEMP%\Cab1D.tmp
%TEMP%\Cab1F.tmp
%TEMP%\Cab15.tmp
%TEMP%\Cab17.tmp
%TEMP%\Cab19.tmp
%TEMP%\Cab27.tmp
%TEMP%\z687
%TEMP%\z166
%TEMP%\Cab21.tmp
%TEMP%\Cab23.tmp
%TEMP%\Cab25.tmp
%TEMP%\Cab13.tmp
%TEMP%\aut3.tmp
%TEMP%\aut4.tmp
%TEMP%\Cab5.tmp
%TEMP%\aut1.tmp
%TEMP%\mmrfoft
%TEMP%\aut2.tmp
%TEMP%\CabD.tmp
%TEMP%\CabF.tmp
%TEMP%\Cab11.tmp
%TEMP%\Cab7.tmp
%TEMP%\Cab9.tmp
%TEMP%\CabB.tmp
Network activity:
Connects to:
'ca#####.digicert.com':80
'any':1337
'bl####ills.ddns.net':1337
'wp#d':80
'www.download.windowsupdate.com':80
TCP:
HTTP GET requests:
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
http://ca#####.digicert.com/DigiCertAssuredIDRootCA.crt
http://11#.#11.111.1/wpad.dat via wp#d
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt
UDP:
DNS ASK ca#####.digicert.com
DNS ASK de###sing.top
DNS ASK bl####ills.ddns.net
DNS ASK wp#d
DNS ASK www.download.windowsupdate.com
Miscellaneous:
Searches for the following windows:
ClassName: 'MS_WebcheckMonitor' WindowName: ''
ClassName: 'MS_AutodialMonitor' WindowName: ''
Descargue Dr.Web para Android
Gratis por 3 meses
Todos los componentes de protección
Renovación de la demo a través de AppGallery/Google Pay
Si Vd. continúa usando este sitio web, esto significa que Vd. acepta el uso de archivos Cookie y otras tecnologías para que recabemos las estadísticas sobre los visitantes. Más información
OK