JavaScript support is required for our site to be fully operational in your browser.
Win32.HLLM.Reset.134
Added to the Dr.Web virus database:
2011-07-06
Virus description added:
2014-10-02
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe,,%PROGRAM_FILES%\ebaurodr\mhrhcrji.exe'
Creates or modifies the following files:
%HOMEPATH%\Start Menu\Programs\Startup\mhrhcrji.exe
Infects the following executable files:
%PROGRAM_FILES%\FireFox\nss3.dll
%PROGRAM_FILES%\FireFox\nspr4.dll
%PROGRAM_FILES%\FireFox\nsinstall.exe
%PROGRAM_FILES%\FireFox\nssutil3.dll
%PROGRAM_FILES%\FireFox\nssdbm3.dll
%PROGRAM_FILES%\FireFox\nssckbi.dll
%PROGRAM_FILES%\FireFox\mozsqlite3.dll
%PROGRAM_FILES%\FireFox\js.exe
%PROGRAM_FILES%\FireFox\IA2Marshal.dll
%PROGRAM_FILES%\FireFox\freebl3.dll
%PROGRAM_FILES%\FireFox\mozjs.dll
%PROGRAM_FILES%\FireFox\mozalloc.dll
%PROGRAM_FILES%\FireFox\mangle.exe
%PROGRAM_FILES%\FireFox\xpcshell.exe
%PROGRAM_FILES%\FireFox\xpcom.dll
%PROGRAM_FILES%\FireFox\updater.exe
%PROGRAM_FILES%\FireFox\xpt_link.exe
%PROGRAM_FILES%\FireFox\xpt_dump.exe
%PROGRAM_FILES%\FireFox\xpidl.exe
%PROGRAM_FILES%\FireFox\ssl3.dll
%PROGRAM_FILES%\FireFox\plugin-container.exe
%PROGRAM_FILES%\FireFox\plds4.dll
%PROGRAM_FILES%\FireFox\plc4.dll
%PROGRAM_FILES%\FireFox\softokn3.dll
%PROGRAM_FILES%\FireFox\smime3.dll
%PROGRAM_FILES%\FireFox\shlibsign.exe
C:\Far2\Plugins\Compare\Compare.dll
C:\Far2\Plugins\Colorer\bin\colorer.dll
C:\Far2\Plugins\Brackets\Brackets.dll
C:\Far2\Plugins\FarCmds\FARCmds.dll
C:\Far2\Plugins\EMenu\EMenu.dll
C:\Far2\Plugins\DrawLine\DrawLine.dll
C:\Far2\Plugins\arclite\arclite.dll
C:\Far2\FExcept\ExcDump.dll
C:\Far2\FExcept\demangle32.dll
C:\Far2\Far.exe
C:\Far2\Plugins\arclite\7z.dll
C:\Far2\Plugins\7-Zip\7-ZipFar.dll
C:\Far2\FExcept\FExcept.dll
%PROGRAM_FILES%\FireFox\AccessibleMarshal.dll
%CommonProgramFiles%\System\Ole DB\MSDAIPP.DLL
%CommonProgramFiles%\Microsoft Shared\VC\msdia80.dll
%PROGRAM_FILES%\FireFox\firefox.exe
%PROGRAM_FILES%\FireFox\crashreporter.exe
%PROGRAM_FILES%\FireFox\components\browsercomps.dll
C:\Far2\Plugins\WinSCP\WinSCP.dll
C:\Far2\Plugins\MacroView\MacroView.dll
C:\Far2\Plugins\HlfViewer\HlfViewer.dll
C:\Far2\Plugins\FTP\FarFtp.dll
C:\Far2\Plugins\TmpPanel\TmpPanel.dll
C:\Far2\Plugins\ProcList\Proclist.dll
C:\Far2\Plugins\Network\Network.dll
Modifies master boot record (MBR).
Malicious functions:
Creates and executes the following:
'%TEMP%\empchqloliakgweu.exe'
Hooks the following functions in System Service Descriptor Table (SSDT):
NtOpenKey, handler: tssofofu.sys
NtCreateKey, handler: tssofofu.sys
Modifies settings of Windows Internet Explorer:
[<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0] '1201' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0] '1201' = '00000000'
Modifies file system :
Creates the following files:
%TEMP%\~TM5.tmp
%TEMP%\~TM4.tmp
%TEMP%\tssofofu.sys
%WINDIR%\Temp\7fffffb1
%WINDIR%\Temp\6decd52f
%TEMP%\~TM2.tmp
%TEMP%\~TM1.tmp
%TEMP%\empchqloliakgweu.exe
%PROGRAM_FILES%\ebaurodr\mhrhcrji.exe
<LS_APPDATA>\niuydqre.log
Sets the 'hidden' attribute to the following files:
%HOMEPATH%\Start Menu\Programs\Startup\mhrhcrji.exe
Deletes the following files:
%TEMP%\~TM5.tmp
%TEMP%\tssofofu.sys
%TEMP%\~TM4.tmp
%TEMP%\~TM1.tmp
%TEMP%\~TM2.tmp
Network activity:
Connects to:
'il#####ti9999900.com':443
'um#####-corp-0001.com':443
'ho####0000-spot.com':443
'sa####00000012.com':443
'74.##5.232.51':80
'gi####sm-main.com':443
'in####000000019.com':443
UDP:
DNS ASK il#####ti9999900.com
DNS ASK um#####-corp-0001.com
DNS ASK ho####0000-spot.com
DNS ASK sa####00000012.com
DNS ASK google.com
DNS ASK gi####sm-main.com
DNS ASK in####000000019.com
Download Dr.Web for Android
Free three-month trial
All protection features available
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more
OK