JavaScript support is required for our site to be fully operational in your browser.
Win32.Rmnet.12
Added to the Dr.Web virus database:
2011-09-19
Virus description added:
2011-09-30
Technical Information
To ensure autorun and distribution:
Creates or modifies the following files:
%HOMEPATH%\Start Menu\Programs\Startup\ialxblbg.exe
Creates the following files on removable media:
<Drive name for removable media>:\RECYCLER\S-4-5-31-0730777114-3188334412-751214860-7507\AGroPrqB.cpl
<Drive name for removable media>:\autorun.inf
<Drive name for removable media>:\RECYCLER\S-4-5-31-0730777114-3188334412-751214860-7507\cegkOjRY.exe
Malicious functions:
Injects code into
the following system processes:
a large number of user processes.
Modifies file system :
Creates the following files:
%PROGRAM_FILES%\Internet Explorer\dmlconf.dat
Sets the 'hidden' attribute to the following files:
%HOMEPATH%\Start Menu\Programs\Startup\ialxblbg.exe
Network activity:
Connects to:
'rt####jyuver.com':447
'wq######rstyhcerveantbe.com':447
'tv#####nyvwstrtve.com':447
'su###wdmn.com':447
'74.##5.232.51':80
UDP:
DNS ASK rt####jyuver.com
DNS ASK wq######rstyhcerveantbe.com
DNS ASK tv#####nyvwstrtve.com
DNS ASK su###wdmn.com
DNS ASK google.com
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more
OK