Mi biblioteca
Mi biblioteca

+ Añadir a la biblioteca

Soporte
Soporte 24 horas | Normas de contactar

Sus solicitudes

Perfil

Trojan.KeyLogger.26551

Added to the Dr.Web virus database: 2015-02-01

Virus description added:

Technical Information

Malicious functions:
Creates and executes the following:
  • '<Current directory>\DNF_ST.exe'
Installs hooks to intercept notifications
on keystrokes:
  • Handler for all processes: <Current directory>\cfgdll.dll
Modifies file system :
Creates the following files:
  • <Current directory>\Нјїв\ё±±ѕ_К§ВдµДЙсµо_К§ВдЙсµоµДШ¬ГО.bmp
  • <Current directory>\Нјїв\ё±±ѕ_УАєгГОѕі_Б¦ЛщДЬј°µДКВ.bmp
  • <Current directory>\Нјїв\ё±±ѕ_УАєгГОѕі_ГОЦРµДєф»Ѕ.bmp
  • <Current directory>\Нјїв\ё±±ѕ_ДєЙ«Ц®іЗ_ДєЙ«Ц®іЗµДШ¬ГО.bmp
  • <Current directory>\Нјїв\ё±±ѕ_ј«№в»Гѕі_ј«№в»Гѕі.bmp
  • <Current directory>\Нјїв\±јЕЬ.bmp
  • <Current directory>\Нјїв\ё±±ѕ_ёсАјЦ®»р_ѕ«БйГЗµДѕцТй.bmp
  • <Current directory>\Нјїв\З©µЅ±јЕЬ.bmp
  • <Current directory>\Нјїв\ИООсµг»ч.bmp
  • <Current directory>\Нјїв\ё±±ѕ_ОБТЯЦ®Фґ_Гс±ш¶Уі¤єШјУЛ№.bmp
  • <Current directory>\Нјїв\їХјјДЬАё.bmp
  • <Current directory>\Нјїв\Ѕы±Х2.bmp
  • <Current directory>\Нјїв\Ѕы±Х3.bmp
  • <Current directory>\Нјїв\Ѕы±Х.bmp
  • <Current directory>\Нјїв\ё±±ѕ_ј«№в»Гѕі_ИьАцСЗµДИҐПт.bmp
  • <Current directory>\Нјїв\Д§·ЁК¦(Е®)_101.bmp
  • <Current directory>\Нјїв\ё±±ѕ_·иїсµДјАµд_ЎѕёцРФјјДЬЎїЕСНЅСЗ¶Ў°НµВ.bmp
  • <Current directory>\Нјїв\єПіЙ·вУЎЧ°±ёA2.bmp
  • <Current directory>\Нјїв\Д§·ЁК¦(ДР)_102.bmp
  • <Current directory>\Нјїв\ёс¶·јТ(Е®)_101.bmp
  • <Current directory>\Нјїв\ёс¶·јТ(Е®)_102.bmp
  • <Current directory>\Нјїв\Д§·ЁК¦(ДР)_101.bmp
  • <Current directory>\Нјїв\№ЕіЗТЕОп.bmp
  • <Current directory>\Нјїв\МмбЎѕЮКЮµДБЫЖ¬.bmp
  • <Current directory>\Нјїв\ё±±ѕ_±щґМНҐФє_±щґМНҐФєµДШ¬ГО.bmp
  • <Current directory>\Нјїв\ёЎУОКЇФ­КЇ.bmp
  • <Current directory>\Нјїв\єПіЙ·вУЎЧ°±ёA.bmp
  • <Current directory>\Нјїв\єПіЙ·вУЎЧ°±ёB2.bmp
  • <Current directory>\Нјїв\єПіЙ·вУЎЧ°±ёB.bmp
  • <Current directory>\Нјїв\ИООсµг»ч2.bmp
  • <Current directory>\ЕдЦГ\ё±±ѕРЕПў.ini
  • <Current directory>\plugin\dm.dll
  • <Current directory>\ЕдЦГ\NPCРЕПў.ini
  • <Current directory>\Нјїв\µЅNPCЙМµк№єОпЛµГч.jpg
  • <Current directory>\Нјїв\ТмЅзµШПВіЗ№ҐВФЅМіМїЄ№ШїЄ.bmp
  • <Current directory>\Нјїв\УВХЯЙијЖНј.bmp
  • C:\s_game\plug_in\dm.dll
  • <Current directory>\ЕдЦГ\ИООсРЕПў.txt
  • <Current directory>\ЕдЦГ\МШКвИООсРЕПў.txt
  • <Current directory>\ЕдЦГ\Ц°ТµРЕПў.ini
  • <Current directory>\ЧЦїв\ИООсРЕПў.txt
  • <Current directory>\ЧЦїв\МШКвИООсРЕПў.txt
  • <Current directory>\ЧЦїв\NPCРЕПў.txt
  • <Current directory>\ЕдЦГ\ИООсРЕПў.ini
  • <Current directory>\Нјїв\ТмЅзµШПВіЗ№ҐВФЅМіМїЄ№Ш.bmp
  • <Current directory>\Нјїв\ґґЅЁЅЗЙ«3.bmp
  • <Current directory>\Нјїв\ґґЅЁЅЗЙ«2.bmp
  • <Current directory>\Нјїв\ё±±ѕ_УДЪ¤јаУь_ФЩґОПаУцµДЙЩЕ®.bmp
  • <Current directory>\Нјїв\РЮБ¶ЅзРВРЗ.bmp
  • <Current directory>\Нјїв\ё±±ѕ_±щѕ§Й­БЦ_їбє®АґП®.bmp
  • <Current directory>\Нјїв\ё±±ѕ_Л®ѕ§їуВц_µЫ№ъѕьµДП®»ч.bmp
  • <Current directory>\Нјїв\УВХЯ№йАґ.bmp
  • <Current directory>\Нјїв\±щЦ®ЛюА­ївніНЕФ±.bmp
  • <Current directory>\Нјїв\БТСЧЦ®КЦІЁ¶ыА­.bmp
  • <Current directory>\Нјїв\ЛАНцЦ®ДЙМШСЗ.bmp
  • <Current directory>\Нјїв\ХЩ»ЅЙіУ°±ґАыМШ.bmp
  • <Current directory>\Нјїв\УЕ»ЭИЇАсєРРЎНј±к.bmp
  • <Current directory>\Нјїв\XНЛіц.bmp
  • <Current directory>\Нјїв\БчАЛУ¶±шДщФъµВ.bmp
  • <Current directory>\Нјїв\ёс¶·јТ(ДР)_102.bmp
  • <Current directory>\plugin\MYPLUGINUI.DLL
  • <Current directory>\plugin\BKGND.DLL
  • <Current directory>\plugin\JK.DLL
  • <Current directory>\plugin\WINDOW.DLL
  • %TEMP%\plugin.zip
  • <Current directory>\plugin\GETSYSINFO.DLL
  • <Current directory>\plugin\MSG.DLL
  • %TEMP%\mymacro.zip
  • <Current directory>\cfgdll.dll
  • <Current directory>\ShieldModule.dat
  • <Current directory>\plugin\JDYANSWER.DLL
  • <Current directory>\plugin\FILE.DLL
  • <Current directory>\plugin\MEDIA.DLL
  • <Current directory>\plugin\SYS.DLL
  • %TEMP%\2.tmp
  • <Current directory>\3.bat
  • <Current directory>\开机延迟启动脚本_____________________请直接把我丢开机启动项里.bat
  • <Current directory>\rsaenh.dll
  • <Current directory>\1.bat
  • <Current directory>\DNF_ST.exe
  • <Current directory>\plugin\DAMA2QMPLUGIN.DLL
  • <Current directory>\plugin\REMOTEANSWER.DLL
  • <Current directory>\SD003.dat
  • <Current directory>\SD004.dat
  • %TEMP%\1.tmp
  • <Current directory>\SD000.dat
  • <Current directory>\140218_x64.sys
  • <Current directory>\140321.sys
  • <Current directory>\runner.dat
  • %APPDATA%\mymacro\qdisp.dll
  • <Current directory>\Нјїв\ЙсЗ№КЦ(Е®)_102.bmp
  • <Current directory>\Нјїв\ЙсЗ№КЦ(ДР)_101.bmp
  • <Current directory>\Нјїв\ЙсЗ№КЦ(ДР)_102.bmp
  • <Current directory>\Нјїв\РДТвАсєР2.bmp
  • <Current directory>\Нјїв\Ѕ±Аш2.bmp
  • <Current directory>\Нјїв\јјДЬµИј¶Lv14.bmp
  • <Current directory>\Нјїв\РДТвЧ°°зАсєР.bmp
  • <Current directory>\Нјїв\№нЅЈКї(Е®)_102.bmp
  • <Current directory>\Нјїв\Д§·ЁК¦(Е®)_102.bmp
  • <Current directory>\Нјїв\ёс¶·јТ(ДР)_101.bmp
  • <Current directory>\Нјїв\№нЅЈКї(Е®)_101.bmp
  • <Current directory>\Нјїв\ЙсЗ№КЦ(Е®)_101.bmp
  • <Current directory>\Нјїв\№нЅЈКї(ДР)_101.bmp
  • <Current directory>\Нјїв\№нЅЈКї(ДР)_102.bmp
  • <Current directory>\Нјїв\јјДЬµИј¶Lv13.bmp
  • %APPDATA%\qmacro\shield\SD003.dat
  • %APPDATA%\qmacro\shield\SD004.dat
  • %APPDATA%\qmacro\shield\Shield.ini
  • %APPDATA%\qmacro\shield\SD002.dat
  • %TEMP%\b8d3.tmp
  • %APPDATA%\qmacro\shield\SD000.dat
  • %APPDATA%\qmacro\shield\SD001.dat
  • <Current directory>\Нјїв\ё±±ѕ_GBLЕ®Йсµо_№оТмµДGBLЕ®Йсµо.bmp
  • <Current directory>\Нјїв\іЙјЁ2.bmp
  • <Current directory>\Нјїв\ґґЅЁЅЗЙ«.bmp
  • <Current directory>\plugin\FILE.ini
  • <Current directory>\DNF_ST.ini
  • <Current directory>\timer_icon.ico
  • <Current directory>\uservar.ini
Deletes the following files:
  • <Current directory>\timer_icon.ico
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\Q03833[1].htm
  • <Current directory>\ShieldModule.dat
  • %TEMP%\plugin.zip
  • %TEMP%\mymacro.zip
Network activity:
Connects to:
  • 'c.###huoa.com':80
TCP:
HTTP GET requests:
  • c.###huoa.com/banner/Q03833.htm
UDP:
  • DNS ASK c.###huoa.com
Miscellaneous:
Searches for the following windows:
  • ClassName: 'Shell_TrayWnd' WindowName: ''
  • ClassName: 'EDIT' WindowName: ''

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android