マイライブラリ
マイライブラリ

+ マイライブラリに追加

電話

お問い合わせ履歴

電話(英語)

+7 (495) 789-45-86

Profile

Win32.HLLW.Autoruner.57357

Added to the Dr.Web virus database: 2011-08-31

Virus description added:

Technical Information

To ensure autorun and distribution:
Creates the following files on removable media:
  • <Drive name for removable media>:\RECYCLER\wmimgmt.com
  • <Drive name for removable media>:\~humbs.tmp
  • <Drive name for removable media>:\RECYCLER\desktop.ini
Malicious functions:
Creates and executes the following:
  • %ALLUSERSPROFILE%\Application Data\wmimgmt.exe 
Executes the following:
  • <SYSTEM32>\ipconfig.exe /all
  • <SYSTEM32>\netstat.exe -ano
  • <SYSTEM32>\arp.exe -a
  • <SYSTEM32>\reg.exe query HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Common\UserInfo
  • <SYSTEM32>\reg.exe query HKEY_CURRENT_USER\Software\Microsoft\Office\12.0\Common\UserInfo
  • <SYSTEM32>\reg.exe query HKEY_CURRENT_USER\Software\Microsoft\Office\13.0\Common\UserInfo
  • <SYSTEM32>\nbtstat.exe -c
  • <SYSTEM32>\net1.exe start
  • <SYSTEM32>\net1.exe share
  • <SYSTEM32>\netstat.exe -r
  • <SYSTEM32>\route.exe print
  • <SYSTEM32>\nbtstat.exe -n
  • <SYSTEM32>\reg.exe query HKEY_CURRENT_USER\Software\Microsoft\Office\10.0\Common\UserInfo
  • <SYSTEM32>\net1.exe user
  • <SYSTEM32>\net1.exe localgroup %USERNAME%s
  • <SYSTEM32>\tasklist.exe
  • <SYSTEM32>\notepad.exe ""%TEMP%\VMvareDnd.log""
  • <SYSTEM32>\findstr.exe /s "YM.CGP_" "%HOMEPATH%"\..\*.txt
  • <SYSTEM32>\chcp.com
  • <SYSTEM32>\reg.exe query HKEY_CURRENT_USER\Software\Microsoft\Office
  • <SYSTEM32>\reg.exe query HKEY_CURRENT_USER\Software\Microsoft\Office\8.0\Common\UserInfo
  • <SYSTEM32>\reg.exe query HKEY_CURRENT_USER\Software\Microsoft\Office\9.0\Common\UserInfo
  • <SYSTEM32>\systeminfo.exe
  • <SYSTEM32>\reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer"
  • <SYSTEM32>\find.exe "REG_"
Modifies file system :
Creates the following files:
  • %TEMP%\drivers.p
  • %TEMP%\ghi.bat
  • %TEMP%\INFO.TXT
  • %TEMP%\temp.vih
  • %ALLUSERSPROFILE%\Application Data\wmimgmt.exe
  • %TEMP%\avp.exe
Sets the 'hidden' attribute to the following files:
  • <Drive name for removable media>:\AuToRUn.iNf
  • <Drive name for removable media>:\RECYCLER\desktop.ini
Deletes the following files:
  • %TEMP%\avp.exe
  • %TEMP%\temp.vih
Network activity:
UDP:
  • DNS ASK windowsupdate.microsoft.com
Miscellaneous:
Searches for the following windows:
  • ClassName: 'Shell_TrayWnd' WindowName: ''
  • ClassName: 'MS_WINHELP' WindowName: ''
  • ClassName: 'Notepad' WindowName: ''