マイライブラリ
マイライブラリ

+ マイライブラリに追加

電話

お問い合わせ履歴

電話(英語)

+7 (495) 789-45-86

Profile

Win32.HLLW.Autoruner1.45768

Added to the Dr.Web virus database: 2013-07-09

Virus description added:

Technical Information

Malicious functions:
To bypass firewall, removes or modifies the following registry keys:
  • [<HKLM>\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '%APPDATA%\Roaming\AHDATZ.exe' = '%APPDATA%\Roaming\AHDATZ.exe:*:Enabled:Windows Messanger'
  • [<HKLM>\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '<Full path to virus>' = '<Full path to virus>:*:Enabled:Windows Messanger'
  • [<HKLM>\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile] 'DoNotAllowExceptions' = '00000000'
Executes the following:
  • '<SYSTEM32>\reg.exe' ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "%APPDATA%\Roaming\AHDATZ.exe" /t REG_SZ /d "%APPDATA%\Roaming\AHDATZ.exe:*:Enabled:Windows Messanger" /f
  • '<SYSTEM32>\wermgr.exe' -queuereporting
  • '<SYSTEM32>\reg.exe' ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "<Full path to virus>" /t REG_SZ /d "<Full path to virus>:*:Enabled:Windows Messanger" /f
  • '<SYSTEM32>\reg.exe' ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
Modifies file system :
Creates the following files:
  • %APPDATA%\Roaming\AHDATZ.exe
  • %APPDATA%\Roaming\l
  • %TEMP%\autA41B.tmp
  • %TEMP%\m987584.rcf
Deletes the following files:
  • %TEMP%\autA41B.tmp
Network activity:
UDP:
  • DNS ASK 6r####p.no-ip.biz
  • DNS ASK 5r####p.no-ip.biz
  • DNS ASK 7r####p.no-ip.biz
  • DNS ASK 9r####p.no-ip.biz
  • DNS ASK 8r####p.no-ip.biz
  • DNS ASK 4r####p.no-ip.biz
  • DNS ASK dn#.##ftncsi.com
  • DNS ASK ro####.no-ip.biz
  • DNS ASK 1r####p.no-ip.biz
  • DNS ASK 3r####p.no-ip.biz
  • DNS ASK 2r####p.no-ip.biz
Miscellaneous:
Searches for the following windows:
  • ClassName: 'Shell_TrayWnd' WindowName: '(null)'