マイライブラリ
マイライブラリ

+ マイライブラリに追加

電話

お問い合わせ履歴

電話(英語)

+7 (495) 789-45-86

Profile

Win32.HLLM.Limar.4455

Added to the Dr.Web virus database: 2013-04-21

Virus description added:

Technical Information

To ensure autorun and distribution:
Creates or modifies the following files:
  • %HOMEPATH%\Start Menu\Programs\Startup\t3FnEAkaLpQ.exe
Malicious functions:
Executes the following:
  • '<SYSTEM32>\svchost.exe' netsvcs
  • '%WINDIR%\explorer.exe'
Injects code into
the following system processes:
  • %WINDIR%\Explorer.EXE
Modifies file system :
Creates the following files:
  • %TEMP%\12.tmp
  • %TEMP%\13.tmp
  • %TEMP%\14.tmp
  • %TEMP%\F.tmp
  • %TEMP%\10.tmp
  • %TEMP%\11.tmp
  • %TEMP%\15.tmp
  • %TEMP%\19.tmp
  • %TEMP%\1A.tmp
  • %TEMP%\1B.tmp
  • %TEMP%\16.tmp
  • %TEMP%\17.tmp
  • %TEMP%\18.tmp
  • %TEMP%\E.tmp
  • %TEMP%\~TM4.tmp
  • %TEMP%\~TM5.tmp
  • %TEMP%\6.tmp
  • %TEMP%\1.tmp
  • %TEMP%\2.tmp
  • %TEMP%\3.tmp
  • %TEMP%\7.tmp
  • %TEMP%\B.tmp
  • %TEMP%\C.tmp
  • %TEMP%\D.tmp
  • %TEMP%\8.tmp
  • %TEMP%\9.tmp
  • %TEMP%\A.tmp
Sets the 'hidden' attribute to the following files:
  • %HOMEPATH%\Start Menu\Programs\Startup\t3FnEAkaLpQ.exe
Deletes the following files:
  • %TEMP%\13.tmp
  • %TEMP%\12.tmp
  • %TEMP%\14.tmp
  • %TEMP%\6.tmp
  • %TEMP%\10.tmp
  • %TEMP%\11.tmp
  • %TEMP%\15.tmp
  • %TEMP%\19.tmp
  • %TEMP%\1A.tmp
  • %TEMP%\1B.tmp
  • %TEMP%\16.tmp
  • %TEMP%\17.tmp
  • %TEMP%\18.tmp
  • %TEMP%\F.tmp
  • %TEMP%\~TM4.tmp
  • %TEMP%\~TM5.tmp
  • %TEMP%\7.tmp
  • %TEMP%\1.tmp
  • %TEMP%\2.tmp
  • %TEMP%\3.tmp
  • %TEMP%\8.tmp
  • %TEMP%\C.tmp
  • %TEMP%\D.tmp
  • %TEMP%\E.tmp
  • %TEMP%\9.tmp
  • %TEMP%\A.tmp
  • %TEMP%\B.tmp
Deletes itself.
Network activity:
Connects to:
  • 'ne#####uhdf7ewuhfeh.org':80
UDP:
  • DNS ASK ne#####uhdf7ewuhfeh.org
Miscellaneous:
Searches for the following windows:
  • ClassName: 'Shell_TrayWnd' WindowName: ''