JavaScript support is required for our site to be fully operational in your browser.
Win32.HLLM.Reset.491
Added to the Dr.Web virus database:
2016-03-22
Virus description added:
2016-07-28
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'ByjJjqlf' = '%TEMP%\byjjjqlf.exe'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'RarExsdb' = '<LS_APPDATA>\jwaroevi\rarexsdb.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe,,<LS_APPDATA>\jwaroevi\rarexsdb.exe'
Creates or modifies the following files:
%HOMEPATH%\Start Menu\Programs\Startup\rarexsdb.exe
Malicious functions:
To bypass firewall, removes or modifies the following registry keys:
[<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile] 'DisableNotifications' = '00000001'
[<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile] 'DoNotAllowExceptions' = '00000000'
[<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile] 'EnableFirewall' = '00000000'
To complicate detection of its presence in the operating system,
blocks execution of the following system utilities:
Windows Update
Windows Security Center
blocks the following features:
Creates and executes the following:
Executes the following:
'<SYSTEM32>\svchost.exe'
'%TEMP%\byjjjqlf.exe'
Injects code into
the following system processes:
Modifies file system:
Creates the following files:
<LS_APPDATA>\jwaroevi\rarexsdb.exe
%TEMP%\ifqydaby.exe
<LS_APPDATA>\lawhwilb.log
%TEMP%\byjjjqlf.exe
%ALLUSERSPROFILE%\Application Data\ybfcuwpc.log
Sets the 'hidden' attribute to the following files:
%HOMEPATH%\Start Menu\Programs\Startup\rarexsdb.exe
Network activity:
Connects to:
'qa#####urmebijlnd.com':443
'en###pax.com':443
'bg###orpy.com':443
'gw#####secbnejofng.com':443
'uu###nsf.com':443
'ne###myfjth.com':443
'ww####nlhfllneb.com':443
'91.##7.104.175':443
'74.##5.232.51':80
'jw###tioead.com':443
'xq#####tpqbxixjp.com':443
'pk#####uudiqrmyyi.com':443
UDP:
DNS ASK xg####pjxsqknl.com
DNS ASK qr####bwqxsoh.com
DNS ASK gw#####secbnejofng.com
DNS ASK cw###rwkg.com
DNS ASK pt####pddptyy.com
DNS ASK ea###jvlfd.com
DNS ASK ip#####dubxckjmjcuv.com
DNS ASK wb####jkfkcpn.com
DNS ASK yy###skalki.com
DNS ASK uu###nsf.com
DNS ASK pk#####uudiqrmyyi.com
DNS ASK xq#####tpqbxixjp.com
DNS ASK google.com
DNS ASK ww####nlhfllneb.com
DNS ASK jw###tioead.com
DNS ASK qa#####urmebijlnd.com
DNS ASK ne###myfjth.com
DNS ASK bg###orpy.com
DNS ASK en###pax.com
Miscellaneous:
Searches for the following windows:
ClassName: 'Indicator' WindowName: ''
Download Dr.Web for Android
Free three-month trial
All protection features available
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more
OK