マイライブラリ
マイライブラリ

+ マイライブラリに追加

電話

お問い合わせ履歴

電話(英語)

+7 (495) 789-45-86

Profile

Win32.HLLW.Autoruner2.41077

Added to the Dr.Web virus database: 2018-07-06

Virus description added:

Technical Information

To ensure autorun and distribution:
Creates or modifies the following files:
  • %HOMEPATH%\Start Menu\Programs\Startup\IOPGLF.exe
Creates the following files on removable media:
  • <Drive name for removable media>:\x.exe
  • <Drive name for removable media>:\.lnk
Modifies file system:
Creates the following files:
  • %APPDATA%\Windata\IOPGLF.exe
  • %TEMP%\Data.txt
Sets the 'hidden' attribute to the following files:
  • <Drive name for removable media>:\x.exe
Deletes the following files:
  • %TEMP%\Data.txt
Substitutes the following files:
  • %TEMP%\Data.txt
Network activity:
Connects to:
  • 'ip###ore.com':80
  • 'bl######baa2018.ddns.net':5072
TCP:
HTTP GET requests:
  • http://ip###ore.com/checkip/
UDP:
  • DNS ASK ip###ore.com
  • DNS ASK bl######baa2018.ddns.net