マイライブラリ
マイライブラリ

+ マイライブラリに追加

電話

お問い合わせ履歴

電話(英語)

+7 (495) 789-45-86

Profile

Win32.HLLW.Autoruner1.45589

Added to the Dr.Web virus database: 2013-07-08

Virus description added:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'q' = '"xidpwooedd.exe"'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Microsoft Updater' = '"<Full path to virus>"'
Creates the following services:
  • [<HKLM>\SYSTEM\ControlSet001\services\IKEEXT] 'Start' = '00000002'
Malicious functions:
To bypass firewall, removes or modifies the following registry keys:
  • [<HKLM>\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile] 'EnableFirewall' = '00000000'
  • [<HKLM>\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile] 'EnableFirewall' = '00000000'
Executes the following:
  • '<SYSTEM32>\svchost.exe' -k NetworkServiceNetworkRestricted
Terminates or attempts to terminate
the following system processes:
  • <SYSTEM32>\cmd.exe
Modifies file system :
Creates the following files:
  • <LS_APPDATA>\Microsoft\Windows\Temporary Internet Files\Content.IE5\BOWDBRP7\background_gradient[1]
  • <LS_APPDATA>\Microsoft\Windows\Temporary Internet Files\Content.IE5\YF7T7AK2\info_48[1]
  • <LS_APPDATA>\Microsoft\Windows\Temporary Internet Files\Content.IE5\6P5SDOMI\httpErrorPagesScripts[1]
  • C:\ProgramData\Microsoft\RAC\Temp\sqlAEE4.tmp
  • C:\ProgramData\Microsoft\RAC\Temp\sqlAEF5.tmp
  • <LS_APPDATA>\Microsoft\Windows\Temporary Internet Files\Content.IE5\SOXZEUJX\bullet[1]
  • <LS_APPDATA>\Microsoft\Windows\Temporary Internet Files\Content.IE5\6P5SDOMI\picture[1].php
  • <LS_APPDATA>\Microsoft\Windows\Temporary Internet Files\Content.IE5\6P5SDOMI\getunlock[1].php
  • <LS_APPDATA>\Microsoft\Windows\Temporary Internet Files\Content.IE5\SOXZEUJX\errorPageStrings[1]
  • <LS_APPDATA>\Microsoft\Windows\Temporary Internet Files\Content.IE5\BOWDBRP7\ErrorPageTemplate[1]
  • <LS_APPDATA>\Microsoft\Windows\Temporary Internet Files\Content.IE5\YF7T7AK2\navcancl[1]
Deletes the following files:
  • C:\ProgramData\Microsoft\RAC\Temp\sqlAEF5.tmp
  • C:\ProgramData\Microsoft\RAC\Temp\sqlAEE4.tmp
  • %TEMP%\~DF108AE1C7F286617C.TMP
  • <LS_APPDATA>\Microsoft\Windows\Temporary Internet Files\Content.IE5\6P5SDOMI\getunlock[1].php
Network activity:
Connects to:
  • 'kl##.#oes-it.net':80
  • 'localhost':60989
TCP:
HTTP GET requests:
  • kl##.#oes-it.net//picture.php
  • kl##.#oes-it.net//getunlock.php
UDP:
  • DNS ASK kl##.#oes-it.net
Miscellaneous:
Searches for the following windows:
  • ClassName: 'Internet Explorer_Server' WindowName: '(null)'
  • ClassName: 'Shell DocObject View' WindowName: '(null)'
  • ClassName: 'Shell Embedding' WindowName: '(null)'
  • ClassName: 'MS_WebCheckMonitor' WindowName: '(null)'
  • ClassName: 'MS_AutodialMonitor' WindowName: '(null)'
  • ClassName: 'MacromediaFlashPlayerActiveX' WindowName: '(null)'
  • ClassName: 'SystemTray_Main' WindowName: '(null)'
  • ClassName: 'Shell_TrayWnd' WindowName: '(null)'
  • ClassName: 'Indicator' WindowName: '(null)'
  • ClassName: 'Edit' WindowName: '(null)'
  • ClassName: 'Microsoft' WindowName: '(null)'
  • ClassName: '(null)' WindowName: 'View Available Networks'