マイライブラリ
マイライブラリ

+ マイライブラリに追加

電話

お問い合わせ履歴

電話(英語)

+7 (495) 789-45-86

Profile

Trojan.DownLoader22.6064

Added to the Dr.Web virus database: 2016-07-13

Virus description added:

Technical Information

Malicious functions:
Executes the following:
  • '<SYSTEM32>\ping.exe' 127.0.0.1 -n 1
  • '<SYSTEM32>\cmd.exe' /c <Current directory>\Restart.bat
Modifies file system:
Creates the following files:
  • <Current directory>\М쵶\геУкє¬№вґу.bmp
  • <Current directory>\М쵶\Бш°µБиІЁґу2.bmp
  • <Current directory>\М쵶\геУкє¬№вґу2.bmp
  • <Current directory>\М쵶\ЦОБЖЧґМ¬2.bmp
  • <Current directory>\М쵶\ЦОБЖЧґМ¬.bmp
  • <Current directory>\М쵶\МмПгТвѕшґу2.bmp
  • <Current directory>\М쵶\МмПгТвѕшґу.bmp
  • <Current directory>\М쵶\ґє·зЙЎґу.bmp
  • <Current directory>\М쵶\Бш°µБиІЁґу.bmp
  • <Current directory>\М쵶\ґє·зЙЎґу2.bmp
  • <Current directory>\М쵶\ЦОБЖЧґМ¬Гж°е.bmp
  • <Current directory>\М쵶\ѕшГьЙЎґу2.bmp
  • <Current directory>\М쵶\ѕшГьЙЎґу.bmp
  • <Current directory>\М쵶\ј©.bmp
  • <Current directory>\М쵶\ЅвТв№ВЛЄґу.bmp
  • <Current directory>\М쵶\ј©2.bmp
  • <Current directory>\М쵶\ЗеРДРьУсґу2.bmp
  • <Current directory>\М쵶\ЗеРДРьУсґу.bmp
  • <Current directory>\М쵶\ЛйТш.bmp
  • <Current directory>\М쵶\ЛШКЦ»Шґєґу2.bmp
  • <Current directory>\М쵶\ЛШКЦ»Шґєґу.bmp
  • <Current directory>\М쵶\РЮОЄ.bmp
  • <Current directory>\М쵶\О»Гжґ«ЛН.bmp
  • <Current directory>\М쵶\И«ІїНкіЙ.bmp
  • <Current directory>\М쵶\М칥Сʯ2.bmp
  • <Current directory>\М쵶\¶ЇЧч.bmp
  • <Current directory>\М쵶\0.bmp
  • <Current directory>\М쵶\НЛіц.bmp
  • <Current directory>\М쵶\150.bmp
  • <Current directory>\М쵶\50.bmp
  • <Current directory>\М쵶\150150.bmp
  • <Current directory>\М쵶\М칥Сʯ3.bmp
  • <Current directory>\М쵶\ЙЎОи¶Ьґу.bmp
  • <Current directory>\М쵶\АсєР5.bmp
  • <Current directory>\М쵶\ЙЎОи¶Ьґу2.bmp
  • <Current directory>\М쵶\µНТчЗііЄґу2.bmp
  • <Current directory>\М쵶\µНТчЗііЄґу.bmp
  • <Current directory>\М쵶\±ИОд.bmp
  • <Current directory>\М쵶\№йЗК.bmp
  • <Current directory>\М쵶\ЗеїХ.bmp
  • <Current directory>\М쵶\АсєР4.bmp
  • <Current directory>\М쵶\ГЁ.bmp
  • <Current directory>\М쵶\пЪ6.bmp
  • <Current directory>\М쵶\пЪ5.bmp
  • <Current directory>\М쵶\Дг.bmp
  • <Current directory>\М쵶\ј©6.bmp
  • <Current directory>\М쵶\ј©5.bmp
  • <Current directory>\М쵶\ВеСфІщ.bmp
  • <Current directory>\М쵶\30.bmp
  • <Current directory>\М쵶\99.bmp
  • <Current directory>\М쵶\Ри.bmp
  • <Current directory>\М쵶\М°.bmp
  • <Current directory>\М쵶\АҐВШУс.bmp
  • <Current directory>\М쵶\ОЕ3.bmp
  • <Current directory>\М쵶\ОЕ2.bmp
  • <Current directory>\М쵶\ОЕ4.bmp
  • %HOMEPATH%\Desktop\·зУк.lnk
  • <Current directory>\М쵶\ј©7.bmp
  • <Current directory>\М쵶\пЪЖм.bmp
  • <Current directory>\М쵶\АҐВШУсґу.bmp
  • <Current directory>\М쵶\mmlykl.txt
  • <Current directory>\М쵶\ОЕ.bmp
  • <Current directory>\М쵶\td - ё±±ѕ.txt
  • <Current directory>\М쵶\ЙШТфВьУЅґу2.bmp
  • <Current directory>\М쵶\ЙШТфВьУЅґу.bmp
  • <Current directory>\М쵶\ЗфіµМбКѕ.bmp
  • <Current directory>\М쵶\ј©4.bmp
  • <Current directory>\М쵶\ј©3.bmp
  • <Current directory>\М쵶\ЧнД«ЦШЙъґу.bmp
  • <Current directory>\М쵶\ЅвТв№ВЛЄґу2.bmp
  • <Current directory>\М쵶\ЧнД«ЦШЙъґу2.bmp
  • <Current directory>\М쵶\пЪ2.bmp
  • <Current directory>\М쵶\пЪ.bmp
  • <Current directory>\М쵶\ј©ДГ±кјЗ.bmp
  • <Current directory>\М쵶\·Ц.bmp
  • <Current directory>\М쵶\іц.bmp
  • <Current directory>\М쵶\ТС2.bmp
  • <Current directory>\М쵶\ёГ.bmp
  • <Current directory>\М쵶\ТС3.bmp
  • <Current directory>\М쵶\пЪ4.bmp
  • <Current directory>\М쵶\пЪ3.bmp
  • <Current directory>\М쵶\¶УУС.bmp
  • <Current directory>\М쵶\Thumbs.db
  • <Current directory>\М쵶\pm.txt
  • <Current directory>\М쵶\ФфЧ°.bmp
  • <Current directory>\М쵶\Ущ·зЙсРР.bmp
  • <Current directory>\М쵶\їЄКјУОП·.bmp
  • <Current directory>\М쵶\Зй±Ё°е.bmp
  • <Current directory>\М쵶\іЙі¤НЖјц№Ш±Х2.bmp
  • <Current directory>\М쵶\іЙі¤НЖјц№Ш±Х.bmp
  • <Current directory>\М쵶\¶Ф»°№Ш±Х2.bmp
  • <Current directory>\М쵶\¶Ф»°№Ш±Х1.bmp
  • <Current directory>\М쵶\¶Ф»°№Ш±Х3.bmp
  • <Current directory>\М쵶\ТСВъ.bmp
  • <Current directory>\М쵶\ѕНЅьБЖЙЛ.bmp
  • <Current directory>\М쵶\ґтЧш.bmp
  • <Current directory>\М쵶\ДЈКЅЗР»».bmp
  • <Current directory>\М쵶\Бш°µБиІЁ.bmp
  • <Current directory>\М쵶\ДЈКЅЗР»»И·¶Ё.bmp
  • <Current directory>\М쵶\геУкє¬№в.bmp
  • <Current directory>\М쵶\ґО.bmp
  • <Current directory>\М쵶\ЅУµҐ.bmp
  • <Current directory>\М쵶\ґтЧшЧґМ¬.bmp
  • <Current directory>\М쵶\ЅМС§Тэµј№Ш±Х.bmp
  • <Current directory>\М쵶\Й±КЦ°с№Ш±Х.bmp
  • <Current directory>\М쵶\ґє·зЙЎ.bmp
  • <Current directory>\М쵶\td.txt
  • <Current directory>\М쵶\qt.bmp
  • <Current directory>\М쵶\ЙПВнЧґМ¬.bmp
  • <Current directory>\М쵶\ЙЎОиРэ.bmp
  • <Current directory>\М쵶\ЙПВнЧґМ¬2.bmp
  • <SYSTEM32>\fydk.ini
  • <Current directory>\Restart.bat
  • C:\М쵶.zip
  • <Current directory>\CrackCaptchaAPI.dll
  • <Current directory>\dm.dll
  • <Current directory>\М쵶\ЙЎОи¶Ь.bmp
  • <Current directory>\М쵶\МмСДУРАс№Ш±Х.bmp
  • <Current directory>\М쵶\Ф­µШБЖЙЛ.bmp
  • <Current directory>\М쵶\ЖжТ©.bmp
  • <Current directory>\М쵶\є®БЦКи·ј.bmp
  • <Current directory>\М쵶\ЧЛМ¬ЗР»».bmp
  • <Current directory>\М쵶\РЮБ¶.bmp
  • <Current directory>\М쵶\µНТчЗііЄ.bmp
  • <Current directory>\М쵶\№Ш±Х2.bmp
  • <Current directory>\М쵶\°ьё¤+4.bmp
  • <Current directory>\М쵶\ЦъХЅЧоРЎ»Ї.bmp
  • <Current directory>\М쵶\°І.bmp
  • <Current directory>\М쵶\°ьё¤+8.bmp
  • <Current directory>\М쵶\ТС.bmp
  • <Current directory>\М쵶\ОЮ.bmp
  • <Current directory>\М쵶\їЄ.bmp
  • <Current directory>\М쵶\·Й»ЁХЄТ¶.bmp
  • <Current directory>\М쵶\ЖµВК№эµНИ·¶Ё.bmp
  • <Current directory>\М쵶\ПгТвєЫ.bmp
  • <Current directory>\М쵶\І».bmp
  • <Current directory>\М쵶\ЖпіЛ.bmp
  • <Current directory>\М쵶\ёь.bmp
  • <Current directory>\М쵶\Б¦µАФІКЇ2.bmp
  • <Current directory>\М쵶\ИЛ.bmp
  • <Current directory>\М쵶\Мм·ААвКЇ2.bmp
  • <Current directory>\М쵶\АсєР3.bmp
  • <Current directory>\М쵶\°п№±.bmp
  • <Current directory>\М쵶\Й«.bmp
  • <Current directory>\М쵶\АсєР2.bmp
  • <Current directory>\М쵶\НЛ.bmp
  • <Current directory>\М쵶\СйЦ¤Вл.bmp
  • <Current directory>\М쵶\НЛ2.bmp
  • <Current directory>\М쵶\ЛШКЦ»Шґє.bmp
  • <Current directory>\М쵶\АсєР.bmp
  • <Current directory>\М쵶\ЛШКЦГж°е.bmp
  • <Current directory>\М쵶\Чй¶УЅУКЬ2.bmp
  • <Current directory>\М쵶\Чй¶УЅУКЬ.bmp
  • <Current directory>\М쵶\УсБ±·чТВ.bmp
  • <Current directory>\М쵶\ЗеРДРьУс.bmp
  • <Current directory>\М쵶\ЗЩРДИэµю.bmp
  • <Current directory>\М쵶\µЗВјїт.bmp
  • <Current directory>\М쵶\БЖЙЛ.bmp
  • <Current directory>\М쵶\ѕшГьЙЎ.bmp
  • <Current directory>\М쵶\Б¬ЅУК§°Ь.bmp
  • <Current directory>\М쵶\ЅЗЙ«КфРФ№Ш±Х.bmp
  • <Current directory>\М쵶\Ч··зІЅ.bmp
  • <Current directory>\М쵶\ЙШТфВьУЅ.bmp
  • <Current directory>\М쵶\СыЗлЦъХЅ.bmp
  • <Current directory>\М쵶\ЧФѕшѕ­Вц.bmp
  • <Current directory>\М쵶\±і°ь.bmp
  • <Current directory>\М쵶\·ј»ЄТ»ЛІ.bmp
  • <Current directory>\М쵶\ЅЗЙ«КфРФ.bmp
  • <Current directory>\М쵶\РРДТ+6.bmp
Network activity:
Connects to:
  • 'ip.#ool.la':80
  • 'ip.#q.com':80
  • '12#.#25.114.144':80
  • 'www.my#p.cn':80
TCP:
HTTP GET requests:
  • http://ip.#ool.la/
  • http://ip.#q.com/
  • http://op##.baidu.com/special/time/ via 12#.#25.114.144
  • http://www.my#p.cn/
UDP:
  • DNS ASK ip.#ool.la
  • DNS ASK ip.#q.com
  • DNS ASK op##.baidu.com
  • DNS ASK www.my#p.cn
Miscellaneous:
Searches for the following windows:
  • ClassName: 'Shell_TrayWnd' WindowName: ''

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android