Um eine korrekte Funktionsweise unserer Website zu gewährleisten, müssen Sie die Unterstützung für JavaScript in Ihrem Browser aktivieren.
Win32.HLLM.Reset.513
Added to the Dr.Web virus database:
2017-09-24
Virus description added:
2017-09-24
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe,,<LS_APPDATA>\jwaroevi\rarexsdb.exe'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'RarExsdb' = '<LS_APPDATA>\jwaroevi\rarexsdb.exe'
Creates or modifies the following files:
%HOMEPATH%\Start Menu\Programs\Startup\rarexsdb.exe
Malicious functions:
To bypass firewall, removes or modifies the following registry keys:
[<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile] 'DisableNotifications' = '00000001'
[<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile] 'DoNotAllowExceptions' = '00000000'
[<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile] 'EnableFirewall' = '00000000'
To complicate detection of its presence in the operating system,
blocks execution of the following system utilities:
Windows Update
Windows Security Center
blocks the following features:
User Account Control (UAC)
Windows Security Center
Creates and executes the following:
Executes the following:
Injects code into
the following system processes:
the following user processes:
Modifies file system:
Creates the following files:
%ALLUSERSPROFILE%\Application Data\ybfcuwpc.log
<LS_APPDATA>\lawhwilb.log
<LS_APPDATA>\jwaroevi\rarexsdb.exe
%TEMP%\byjjjqlf.exe
%TEMP%\ifqydaby.exe
Sets the 'hidden' attribute to the following files:
%HOMEPATH%\Start Menu\Programs\Startup\rarexsdb.exe
Network activity:
Connects to:
'wc#####tybhaxdhxxob.com':443
'gb####ecwora.com':443
'hx#####pwhlmrxmnx.com':443
'ho####slqfqju.com':443
'ti#####bvkipfueev.com':443
'el#####tnipymvdwt.com':443
'lp#####brlblgfmdq.com':443
'uj####aah61996y.com':443
'74.##5.232.51':80
'ni#####yaenashuuw.com':443
'vw#####qcrfupdkfphj.com':443
'pq###ocbv.com':443
UDP:
DNS ASK ee###rntf.com
DNS ASK et#####wqrdrsulbb.com
DNS ASK rj###lub.com
DNS ASK eq#####eavpcybkow.com
DNS ASK tq###ivxbii.com
DNS ASK cy####vocbxhuec.com
DNS ASK dr####xetonueb.com
DNS ASK el###wqqlw.com
DNS ASK ti###rokbf.com
DNS ASK wl#####vwjvgqfqjwre.com
DNS ASK hl####suaxxksfo.com
DNS ASK na#####wiwwdyeqg.com
DNS ASK jo###hkicas.com
DNS ASK ae#####oqvoqicyux.com
DNS ASK sv###oyush.com
DNS ASK iq###gxt.com
DNS ASK wd###pww.com
DNS ASK ew####dulsiidhp.com
DNS ASK hv#####pqelqtqcv.com
DNS ASK ym###hjju.com
DNS ASK md###ipm.com
DNS ASK gw#####qfyujpcdl.com
DNS ASK vl###qtq.com
DNS ASK cb#####obofpbhajsly.com
DNS ASK gd####yvcuvav.com
DNS ASK ay###mgnpb.com
DNS ASK el#####tnipymvdwt.com
DNS ASK wc#####tybhaxdhxxob.com
DNS ASK gb####ecwora.com
DNS ASK kl#####jjxvirgeh.com
DNS ASK ho####slqfqju.com
DNS ASK ti#####bvkipfueev.com
DNS ASK hx#####pwhlmrxmnx.com
DNS ASK lp#####brlblgfmdq.com
DNS ASK uj####aah61996y.com
DNS ASK google.com
DNS ASK ni#####yaenashuuw.com
DNS ASK vw#####qcrfupdkfphj.com
DNS ASK pq###ocbv.com
DNS ASK tt###fbgokb.com
DNS ASK nm#####sniyvvskpcp.com
DNS ASK el###elny.com
DNS ASK cp####hlmhsuucs.com
DNS ASK jp###qtu.com
DNS ASK lo###nisjsm.com
DNS ASK cs###ievc.com
DNS ASK pw###rhi.com
DNS ASK hh###hsb.com
DNS ASK jf#####ltqboplbv.com
DNS ASK gh####spdappp.com
DNS ASK lh####cgbnkj.com
DNS ASK ux####tkvsqvj.com
Laden Sie Dr.Web für Android herunter
Kostenlos für 3 Monate
Alle Schutzkomponenten
Verlängerung der Testversion über AppGallery/Google Pay
Wenn Sie diese Webseite weiter benutzen, bedeutet dies, dass Sie mit der Verarbeitung von Cookies sowie dem Einsatz anderer Technologien zur Sammlung von statistischen Nutzerdaten einverstanden sind. Mehr dazu
OK