JavaScript support is required for our site to be fully operational in your browser.
Win32.HLLW.Texmer.565
Added to the Dr.Web virus database:
2010-03-30
Virus description added:
2024-12-11
Technical Information
Modifies file system
Creates the following files
%TEMP%\ixp000.tmp\rapidh~1.exe
%TEMP%\ixp000.tmp\file.exe
%LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\desktop.ini
%LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\content.ie5\desktop.ini
%LOCALAPPDATA%\microsoft\windows\history\low\desktop.ini
%LOCALAPPDATA%\microsoft\windows\history\low\history.ie5\desktop.ini
%LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\content.ie5\index.dat
%LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\content.ie5\7y0hahnb\desktop.ini
%LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\content.ie5\1cfl99jt\desktop.ini
%LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\content.ie5\t38g8obx\desktop.ini
%LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\content.ie5\u1r4o0la\desktop.ini
%APPDATA%\microsoft\windows\cookies\low\index.dat
%LOCALAPPDATA%\microsoft\windows\history\low\history.ie5\index.dat
%LOCALAPPDATA%\microsoft\internet explorer\msimgsiz.dat
%LOCALAPPDATA%\microsoft\windows\history\history.ie5\mshist012024120920241210\index.dat
Sets the 'hidden' attribute to the following files
%LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\desktop.ini
%LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\content.ie5\desktop.ini
%LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\content.ie5\7y0hahnb\desktop.ini
%LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\content.ie5\1cfl99jt\desktop.ini
%LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\content.ie5\t38g8obx\desktop.ini
%LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\content.ie5\u1r4o0la\desktop.ini
Network activity
Connects to
'ru#####h.santrex.net':80
'in####ationleak.net':80
TCP
HTTP GET requests
http://ru#####h.santrex.net/files/update.exe
http://www.in####ationleak.net/
http://www.in####ationleak.net/DevOpsDays-BluesBrothers-A.jpg
UDP
DNS ASK ru#####h.santrex.net
DNS ASK in####ationleak.net
Miscellaneous
Searches for the following windows
ClassName: 'MS_AutodialMonitor' WindowName: ''
ClassName: 'MS_WebCheckMonitor' WindowName: ''
Creates and executes the following
'%TEMP%\ixp000.tmp\file.exe'
'%TEMP%\ixp000.tmp\rapidh~1.exe'
Executes the following
'%WINDIR%\syswow64\rundll32.exe' "%WINDIR%\syswow64\WININET.dll",DispatchAPICall 1
Download Dr.Web for Android
Free three-month trial
All protection features available
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more
OK