マイライブラリ
マイライブラリ

+ マイライブラリに追加

電話

お問い合わせ履歴

電話(英語)

+7 (495) 789-45-86

Profile

Win32.HLLW.Autoruner1.28593

Added to the Dr.Web virus database: 2012-10-23

Virus description added:

Technical Information

To ensure autorun and distribution:
Creates or modifies the following files:
  • %HOMEPATH%\Start Menu\Programs\Startup\RUNDLL32.LNK
Creates the following services:
  • [<HKLM>\SYSTEM\ControlSet001\Services\wuauserv] 'Start' = '00000002'
Malicious functions:
Creates and executes the following:
  • %TEMP%\Pre6DDE.tmp
  • %TEMP%\Pre6DDE.tmp (downloaded from the Internet)
Executes the following:
  • <SYSTEM32>\rundll32.exe "<SYSTEM32>\ausrv.dll",CRestart
  • <SYSTEM32>\tasklist.exe
  • <SYSTEM32>\notepad.exe "%WINDIR%\winhelp.exe"
Modifies file system :
Creates the following files:
  • %TEMP%\vmm4D99.tmp
  • %TEMP%\~Thumbbs.tmp
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\dnslookup[1].org&type=A&submit=Resolve
  • %TEMP%\Pre6DDE.tmp
  • %HOMEPATH%\Start Menu\Programs\Microsoft\Shortcut to startup_local.lnk
  • %TEMP%\vmm4A9B.tmp
  • %HOMEPATH%\Start Menu\Programs\Microsoft\RUNDLL32.LNK
  • %TEMP%\vmmC21D.tmp
Deletes the following files:
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\dnslookup[1].org&type=A&submit=Resolve
  • %TEMP%\vmmC21D.tmp
Moves the following files:
  • from %TEMP%\vmm4A9B.tmp to <SYSTEM32>\ausrv.dll
Network activity:
Connects to:
  • 'www.dn###tch.info':80
  • 'li#####zhen.zapto.org':80
TCP:
HTTP GET requests:
  • www.dn###tch.info/dns/dnslookup?la####################################################
  • li#####zhen.zapto.org/update/minjindang.jpg
UDP:
  • DNS ASK www.dn###tch.info
  • DNS ASK li#####zhen.zapto.org
Miscellaneous:
Searches for the following windows:
  • ClassName: 'Notepad' WindowName: ''