マイライブラリ
マイライブラリ

+ マイライブラリに追加

電話

お問い合わせ履歴

電話

03-6550-8770

Profile

Win32.HLLW.Autoruner2.34394

Added to the Dr.Web virus database: 2018-03-18

Virus description added:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Noncolouring' = '%APPDATA%\ilians.exe'
Creates or modifies the following files:
  • %WINDIR%\Tasks\Noncolouring.job
Creates the following files on removable media:
  • <Drive name for removable media>:\scr.exe
Modifies file system:
Creates the following files:
  • %APPDATA%\ScreenShot\screen.jpeg
  • %APPDATA%\ilians.exe
Sets the 'hidden' attribute to the following files:
  • <Drive name for removable media>:\scr.exe
Network activity:
Connects to:
  • 'ag####rime401.com':80
  • 'ch####p.dyndns.org':80
  • 'wp#d':80
TCP:
HTTP GET requests:
  • http://ch####p.dyndns.org/
  • http://11#.#11.111.1/wpad.dat via wp#d
HTTP POST requests:
  • http://www.ag####rime401.com/pr/api.php via ag####rime401.com
UDP:
  • DNS ASK www.ag####rime401.com
  • DNS ASK ch####p.dyndns.org
  • DNS ASK wp#d
Miscellaneous:
Executes the following:
  • '<SYSTEM32>\reg.exe' add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "Noncolouring" /f /t REG_SZ /d "%APPDATA%\ilians.exe
  • '<SYSTEM32>\schtasks.exe' /run /tn "Noncolouring"
  • '<SYSTEM32>\schtasks.exe' /Create /SC HOURLY /MO 12 /TN "Noncolouring" /TR "reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "\""Noncolouring"\"" /f /t REG_SZ /d "\""%APPDATA%\ilians.exe" /RU SYSTEM