[<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '<Full path to virus>' = '<Full path to virus>:*:Enabled:ipsec'
To complicate detection of its presence in the operating system,
forces the system hide from view:
hidden files
blocks the following features:
User Account Control (UAC)
Windows Security Center
Injects code into
the following system processes:
<SYSTEM32>\cmd.exe
<SYSTEM32>\cscript.exe
%WINDIR%\Explorer.EXE
<SYSTEM32>\ctfmon.exe
a large number of user processes.
Modifies file system :
Creates the following files:
C:\autorun.inf
%TEMP%\wingyqrsa.exe
C:\sipjsx.exe
%TEMP%\rubdxm.exe
%TEMP%\flvo.exe
%TEMP%\winsutgy.exe
%TEMP%\winkxyu.exe
%TEMP%\windpcfje.exe
%TEMP%\winajthw.exe
<DRIVERS>\fpkll.sys
Sets the 'hidden' attribute to the following files:
<Drive name for removable media>:\autorun.inf
<Drive name for removable media>:\nnfmro.exe
C:\autorun.inf
C:\sipjsx.exe
Deletes the following files:
%TEMP%\winajthw.exe
%TEMP%\winsutgy.exe
%TEMP%\wingyqrsa.exe
%TEMP%\windpcfje.exe
%TEMP%\winkxyu.exe
<DRIVERS>\fpkll.sys
Network activity:
Connects to:
'46.##5.103.219':80
'pa###p.com.ds':80
TCP:
HTTP GET requests:
46.##5.103.219/sobakavolos.gif?71###########
pa###p.com.ds/sobaka1.gif?70##########
UDP:
DNS ASK pa###p.com.ds
'86.##5.92.172':4948
'12#.#69.199.186':6822
'18#.#21.232.187':8030
'11#.#63.246.13':7456
'19#.#01.193.50':6580
'94.##6.162.132':4294
'1.##.99.246':6882
'95.#6.12.9':6910
'84.##2.248.226':5610
'10#.51.97.0':6028
'18#.#0.223.47':8091
'64.##4.98.137':4310
'89.#3.14.40':3412
'20#.#77.39.91':5951
'17#.#31.254.183':9674
'37.##7.2.104':4579
'27.#1.3.116':5884
'62.##8.71.162':6650
'22#.#01.152.222':8116
'58.##6.123.77':6065
'21#.#0.10.187':6704
'20#.#82.70.74':4804
'20#.#1.24.61':5164
'27.#.56.158':5506
'59.##2.90.21':6274
'77.##.227.26':4343
'12#.#36.66.77':4996
'11#.#3.252.34':8032
'12#.#7.76.102':6740
'92.##.214.217':6822
'1.###.138.163':5141
'85.##4.47.139':6953
'18#.#4.11.190':4477
'20#.#11.244.180':6590
'17#.#13.58.84':5141
'17#.#23.133.97':5905
'49.##7.184.0':6260
'10#.#1.97.244':5415
'17#.#0.49.156':7775
'18#.#03.15.179':6028
'19#.#6.87.42':5545
'93.##8.211.175':5545
'77.##.225.74':6364
'21#.#12.224.146':6964
'17#.#2.25.137':5480
'18#.#2.214.96':6621
'78.##3.173.29':7860
'18#.#4.20.93':5884
'19#.#9.140.77':6925
'13#.#95.91.62':6532
'18#.#8.0.196':5565
'11#.90.99.7':5372
'18#.94.4.58':6500
'85.##2.146.171':9674
'85.##2.157.196':7620
'19#.#52.4.42':6152
'16#.#8.57.71':7300
'11#.#90.240.60':6964
'13#.#92.86.188':7990
'13#.#92.25.106':5372
'13#.#95.4.109':7220
'18#.#54.203.57':6130
'89.##.41.228':4375
'86.##2.110.65':6065
'19#.#55.50.162':7379
'1.#.1.139':6228
'10#.#47.103.136':4539
'60.##9.33.106':5405
'18#.#12.137.85':5240
'77.##.236.110':6856
'20#.#77.156.229':4343
'12#.#9.102.88':5610
'11#.#48.25.156':6442
'89.##.239.206':6260
'89.##3.156.128':5380
'49.##4.215.233':4900
'13#.#92.28.175':5415
'17#.#3.201.155':6028
'11#.#41.191.207':7866
'46.##4.146.172':7538
'20#.#23.217.36':11010
'11#.#63.246.18':5620
'18#.224.9.8':5218
'86.##1.133.253':6420
'12#.9.38.86':9674
'12#.#75.36.168':7948
'11#.#4.91.21':4510
'21#.#04.207.164':5888
'20#.#08.96.135':6166
'20#.#60.55.45':4660
'89.##.169.72':4180
'31.##.224.38':5740
'91.##4.82.107':9674
'85.##6.62.109':6704
'87.##1.31.79':5107
'19#.#6.127.169':5805
'86.##3.176.84':5517
'20#.#0.57.62':5517
'16#.#.101.249':5517
'83.##.19.124':5517
'24#.#2.113.228':5517
'10#.#2.38.78':5517
'85.#5.85.85':5517
'48.#.73.23':5517
'37.##.182.68':5517
'89.##9.236.171':5517
'92.##.84.199':1473
'94.##.206.19':1473
'18#.#36.212.118':7360
'92.##.84.109':1473
'21#.#0.126.141':5630
'81.##0.94.112':6724
'18#.#8.58.176':8040
'20#.#5.100.171':6820
'77.##2.85.173':4956
'20#.#3.53.194':7866
'18#.#08.176.7':6130
'13#.#95.76.180':5650
'12#.#38.178.189':4510
'19#.#7.247.164':6511
'62.##.100.157':4516
'17#.#9.91.121':6455
'12#.#3.168.139':3510
'11#.#2.184.146':5029
'18#.#2.158.25':7866
'89.##.28.145':4505
'77.##.226.48':5951
'11#.#3.209.170':5620
'20#.#62.6.154':6228
'41.##7.220.211':6228
'89.#7.63.12':6688
'86.##1.161.117':6535
'20#.#04.237.224':4936
'20#.#2.176.224':5140
'20#.#2.112.130':5176
'12#.#36.245.204':8030
'17#.#56.160.186':5415
'13#.#.124.237':6390
'16#.#00.94.217':5616
'20#.#08.197.227':6718
'18#.#2.132.131':6820
'20#.#13.137.232':8020
'19#.#75.86.5':6420
'17#.80.7.21':5044
'94.##6.132.230':7140
'46.##.110.15':4544
'18#.#.157.35':7866
'15#.#37.116.11':4492
'12#.#38.180.155':6286
'13#.#.185.117':5421
'19#.#04.209.39':9674
'79.##9.230.17':6228
'19#.#99.205.131':4343
Miscellaneous:
Searches for the following windows:
ClassName: 'Shell_TrayWnd' WindowName: '(null)'
Download Dr.Web for Android
Free three-month trial
All protection features available
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more