Para el funcionamiento correcto del sitio web, debe activar el soporte de JavaScript en su navegador.
Win32.HLLW.Autoruner.38841
Added to the Dr.Web virus database:
2010-12-22
Virus description added:
2012-01-13
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Inoyikotadoqev' = 'rundll32.exe "%WINDIR%\mdfwc1.dll",Startup'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Adobe Updater 7.2' = '<SYSTEM32>\AdobeAQM.exe'
Malicious functions:
To bypass firewall, removes or modifies the following registry keys:
[<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '<SYSTEM32>\AdobeAQM.exe' = '<SYSTEM32>\AdobeAQM.exe:*:Enabled:Explorer'
Creates and executes the following:
<SYSTEM32>\adobemkv.exe
<SYSTEM32>\adobeflv.exe
Executes the following:
<SYSTEM32>\rundll32.exe "%WINDIR%\mdfwc1.dll",iep
<SYSTEM32>\rundll32.exe "%WINDIR%\mdfwc1.dll",Startup
Injects code into
the following system processes:
Hides the following processes:
Modifies file system :
Creates the following files:
%WINDIR%\mdfwc1.dll
<SYSTEM32>\adobemkv.exe
<SYSTEM32>\AdobeAQM.exe
<SYSTEM32>\adobeflv.exe
Sets the 'hidden' attribute to the following files:
Network activity:
Connects to:
'10.##.215.50':139
'10.##.204.242':139
'10.##.235.170':139
'10.##2.102.138':139
'10.##2.225.106':139
'10.##5.10.90':139
'10.##0.41.18':139
'10.##5.133.58':139
'10.##3.153.186':139
'10.##4.143.122':139
'10.##8.184.114':139
'<Private IP address>':139
'10.##0.102.130':445
'10.##0.163.242':445
'10.##0.41.18':445
'10.##9.174.50':445
'10.##9.235.162':445
'10.##0.225.98':445
'10.##.61.154':139
'10.##3.92.74':139
'10.##8.61.146':139
'10.#1.51.90':139
'10.##.123.10':139
'10.##.174.58':139
'10.##.112.202':139
'10.##0.225.98':139
'10.##0.163.242':139
'10.##0.102.130':139
'10.#2.41.26':139
'localhost':1184
'10.##3.215.42':139
'10.##7.194.178':139
'10.#6.82.18':139
'10.#.30.226':139
'10.##5.71.202':139
'10.##.71.210':139
'10.##4.20.154':139
'10.##4.82.10':139
'10.##5.194.170':139
'10.##8.245.226':139
'10.##4.204.234':139
'10.##3.30.218':139
'10.#5.92.82':139
'10.##8.123.2':139
'10.##9.51.82':139
'10.##.143.130':139
'10.##.174.58':445
'10.##.235.170':445
'10.##.143.130':445
'10.##.215.50':445
'10.#5.92.82':445
'10.#2.41.26':445
'10.##2.225.106':445
'10.##3.92.74':445
'10.##2.163.250':445
'10.##2.102.138':445
'10.##3.30.218':445
'10.##.20.162':445
'10.##.61.154':445
'10.##.123.10':445
'<Private IP address>':445
'www.wh###smyip.com':80
'co##mbee.in':80
'10.##.184.122':445
'10.##.153.194':445
'10.#.30.226':445
'10.##.112.202':445
'10.##.245.234':445
'10.#1.51.90':445
'10.##4.82.10':445
'10.##4.143.122':445
'10.##9.51.82':445
'10.##8.184.114':445
'10.##8.245.226':445
'10.##5.10.90':445
'10.##5.194.170':445
'10.##9.112.194':445
'10.##5.133.58':445
'10.##4.204.234':445
'10.##5.71.202':445
'10.##3.153.186':445
'10.#28.0.34':445
'10.##7.194.178':445
'10.##8.123.2':445
'10.##3.215.42':445
'10.##8.61.146':445
'10.##7.133.66':445
'10.##4.20.154':445
'10.##.71.210':445
'10.#6.82.18':445
'10.#7.10.98':445
'10.##.204.242':445
TCP:
HTTP GET requests:
www.wh###smyip.com/automation/n09230945.asp
HTTP POST requests:
co##mbee.in/9823dehj9823dj.php?in##############################################################################################################
UDP:
DNS ASK go##le.ca
DNS ASK co##mbee.in
DNS ASK tu##u.com
DNS ASK www.wh###smyip.com
'<Private IP address>':1037
Miscellaneous:
Searches for the following windows:
ClassName: 'Indicator' WindowName: ''
Descargue Dr.Web para Android
Gratis por 3 meses
Todos los componentes de protección
Renovación de la demo a través de AppGallery/Google Pay
Si Vd. continúa usando este sitio web, esto significa que Vd. acepta el uso de archivos Cookie y otras tecnologías para que recabemos las estadísticas sobre los visitantes. Más información
OK