マイライブラリ
マイライブラリ

+ マイライブラリに追加

電話

お問い合わせ履歴

電話

03-6550-8770

Profile

Win32.HLLW.Texmer.565

Added to the Dr.Web virus database: 2010-03-30

Virus description added:

Technical Information

Modifies file system
Creates the following files
  • %TEMP%\ixp000.tmp\rapidh~1.exe
  • %TEMP%\ixp000.tmp\file.exe
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\desktop.ini
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\content.ie5\desktop.ini
  • %LOCALAPPDATA%\microsoft\windows\history\low\desktop.ini
  • %LOCALAPPDATA%\microsoft\windows\history\low\history.ie5\desktop.ini
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\content.ie5\index.dat
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\content.ie5\7y0hahnb\desktop.ini
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\content.ie5\1cfl99jt\desktop.ini
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\content.ie5\t38g8obx\desktop.ini
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\content.ie5\u1r4o0la\desktop.ini
  • %APPDATA%\microsoft\windows\cookies\low\index.dat
  • %LOCALAPPDATA%\microsoft\windows\history\low\history.ie5\index.dat
  • %LOCALAPPDATA%\microsoft\internet explorer\msimgsiz.dat
  • %LOCALAPPDATA%\microsoft\windows\history\history.ie5\mshist012024120920241210\index.dat
Sets the 'hidden' attribute to the following files
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\desktop.ini
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\content.ie5\desktop.ini
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\content.ie5\7y0hahnb\desktop.ini
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\content.ie5\1cfl99jt\desktop.ini
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\content.ie5\t38g8obx\desktop.ini
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\low\content.ie5\u1r4o0la\desktop.ini
Network activity
Connects to
  • 'ru#####h.santrex.net':80
  • 'in####ationleak.net':80
TCP
HTTP GET requests
  • http://ru#####h.santrex.net/files/update.exe
  • http://www.in####ationleak.net/
  • http://www.in####ationleak.net/DevOpsDays-BluesBrothers-A.jpg
UDP
  • DNS ASK ru#####h.santrex.net
  • DNS ASK in####ationleak.net
Miscellaneous
Searches for the following windows
  • ClassName: 'MS_AutodialMonitor' WindowName: ''
  • ClassName: 'MS_WebCheckMonitor' WindowName: ''
Creates and executes the following
  • '%TEMP%\ixp000.tmp\file.exe'
  • '%TEMP%\ixp000.tmp\rapidh~1.exe'
Executes the following
  • '%WINDIR%\syswow64\rundll32.exe' "%WINDIR%\syswow64\WININET.dll",DispatchAPICall 1