JavaScript support is required for our site to be fully operational in your browser.
Win32.Sector.28684
Added to the Dr.Web virus database:
2017-09-25
Virus description added:
2020-11-24
Technical Information
To ensure autorun and distribution
Sets the following service settings
[<HKLM>\System\CurrentControlSet\Services\amsint32] 'ImagePath' = '<DRIVERS>\lqkntn.sys'
Creates the following services
'IPFILTERDRIVER' <DRIVERS>\ipfltdrv.sys
'amsint32' <DRIVERS>\lqkntn.sys
Malicious functions
To bypass firewall, removes or modifies the following registry keys
[<HKLM>\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile] 'EnableFirewall' = '00000000'
[<HKLM>\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile] 'DoNotAllowExceptions' = '00000000'
[<HKLM>\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile] 'DisableNotifications' = '00000001'
To complicate detection of its presence in the operating system,
forces the system hide from view:
blocks execution of the following system utilities:
blocks the following features:
User Account Control (UAC)
Windows Security Center
Modifies file system
Creates the following files
%WINDIR%\syswow64\drivers\lqkntn.sys
Deletes the following files
%WINDIR%\syswow64\drivers\lqkntn.sys
Miscellaneous
Executes the following
'<SYSTEM32>\rundll32.exe' <SYSTEM32>\FirewallControlPanel.dll,ShowNotificationDialog /configure /ETOnly 0 /OnProfiles 6 /OtherAllowed 0 /OtherBlocked 0 /OtherEdgeAllowed 0 /NewBlocked 4 "<Full path to file>"
Download Dr.Web for Android
Free three-month trial
All protection features available
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more
OK