JavaScript support is required for our site to be fully operational in your browser.
Win32.Induc.4
Added to the Dr.Web virus database:
2014-08-23
Virus description added:
2014-08-24
Technical Information
Malicious functions:
Executes the following:
'<SYSTEM32>\rundll32.exe' dfdts.dll,DfdGetDefaultPolicyAndSMART
Modifies file system :
Creates the following files:
<LS_APPDATA>\Mozilla\Firefox\Profiles\zp7tnb55.default\urlclassifier3.sqlite-journal
%TEMP%\rOFU7qwa.part
<Current directory>\js.log
%APPDATA%\Roaming\Mozilla\Firefox\Profiles\zp7tnb55.default\downloads.sqlite
%APPDATA%\Roaming\Mozilla\Firefox\Profiles\zp7tnb55.default\downloads.sqlite-journal
%APPDATA%\Roaming\Mozilla\Firefox\Profiles\zp7tnb55.default\sessionstore.bak
%APPDATA%\Roaming\Mozilla\Firefox\Profiles\zp7tnb55.default\prefs-1.js
%TEMP%\nsx1610.tmp\System.dll
%APPDATA%\Roaming\Mozilla\Firefox\Profiles\zp7tnb55.default\places.sqlite-wal
%TEMP%\nsx1610.tmp\ShellLink.dll
Deletes the following files:
<LS_APPDATA>\Mozilla\Firefox\Profiles\zp7tnb55.default\urlclassifier3.sqlite-journal
%APPDATA%\Roaming\Mozilla\Firefox\Profiles\zp7tnb55.default\downloads.sqlite-journal
%TEMP%\nsx1610.tmp\ShellLink.dll
%TEMP%\nsx1610.tmp\System.dll
Network activity:
Connects to:
'ma###et.ucoz.ru':80
'fx####s.mozilla.com':80
'localhost':49158
'localhost':49160
TCP:
HTTP GET requests:
fx####s.mozilla.com/en-US/firefox/headlines.xml
ma###et.ucoz.ru/
UDP:
DNS ASK fx####s.mozilla.com
DNS ASK ma###et.ucoz.ru
Miscellaneous:
Searches for the following windows:
ClassName: 'Shell_TrayWnd' WindowName: ''
ClassName: 'OleMainThreadWndClass' WindowName: ''
ClassName: 'FirefoxMessageWindow' WindowName: ''
Download Dr.Web for Android
Free three-month trial
All protection features available
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more
OK