マイライブラリ
マイライブラリ

+ マイライブラリに追加

電話

お問い合わせ履歴

電話(英語)

+7 (495) 789-45-86

Profile

Win32.HLLW.Autoruner1.34981

Added to the Dr.Web virus database: 2013-04-07

Virus description added:

Technical Information

To ensure autorun and distribution:
Creates the following services:
  • [<HKLM>\SYSTEM\ControlSet001\Services\WindowsNT Protection] 'Start' = '00000002'
Creates the following files on removable media:
  • <Drive name for removable media>:\recycle.{645FF040-5081-101B-9F08-00AA002F954E}\auto.bat
  • <Drive name for removable media>:\recycle.{645FF040-5081-101B-9F08-00AA002F954E}\auto.vbs
  • <Drive name for removable media>:\AutoRun.inf
Malicious functions:
Creates and executes the following:
  • <SYSTEM32>\IEXPLORER.EXE
Modifies file system :
Creates the following files:
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\down[1].txt
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\down[1].txt
  • %PROGRAM_FILES%\auto.bat
  • <SYSTEM32>\IEXPLORER.EXE
  • %PROGRAM_FILES%\auto.vbs
Sets the 'hidden' attribute to the following files:
  • <Drive name for removable media>:\recycle.{645FF040-5081-101B-9F08-00AA002F954E}\auto.bat
  • <Drive name for removable media>:\recycle.{645FF040-5081-101B-9F08-00AA002F954E}\auto.vbs
  • <Drive name for removable media>:\AutoRun.inf
Deletes the following files:
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\down[1].txt
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\down[1].txt
  • %PROGRAM_FILES%\auto.vbs
  • %PROGRAM_FILES%\auto.bat
Network activity:
Connects to:
  • '74.##5.232.51':80
TCP:
HTTP GET requests:
  • 74.##5.232.51/site/laoksite/1/down.txt
UDP:
  • DNS ASK si###.google.com