Mi biblioteca
Mi biblioteca

+ Añadir a la biblioteca

Soporte
Soporte 24 horas | Normas de contactar

Sus solicitudes

Perfil

Win32.HLLW.Autoruner.56174

Added to the Dr.Web virus database: 2011-08-13

Virus description added:

Technical Information

Malicious functions:
Creates and executes the following:
  • <SYSTEM32>\11.exe (downloaded from the Internet) 
  • <SYSTEM32>\10.exe (downloaded from the Internet) 
  • <SYSTEM32>\9.exe (downloaded from the Internet) 
  • <SYSTEM32>\12.exe (downloaded from the Internet) 
  • <SYSTEM32>\15.exe (downloaded from the Internet) 
  • <SYSTEM32>\14.exe (downloaded from the Internet) 
  • <SYSTEM32>\13.exe (downloaded from the Internet) 
  • <SYSTEM32>\8.exe (downloaded from the Internet) 
  • <SYSTEM32>\3.exe (downloaded from the Internet) 
  • <SYSTEM32>\2.exe (downloaded from the Internet) 
  • <SYSTEM32>\1.exe (downloaded from the Internet) 
  • <SYSTEM32>\4.exe (downloaded from the Internet) 
  • <SYSTEM32>\7.exe (downloaded from the Internet) 
  • <SYSTEM32>\6.exe (downloaded from the Internet) 
  • <SYSTEM32>\5.exe (downloaded from the Internet) 
Executes the following:
  • <SYSTEM32>\cmd.exe /c <SYSTEM32>\Deleteme.bat
  • <SYSTEM32>\calc.exe
Modifies file system :
Creates the following files:
  • <SYSTEM32>\10.exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\ULU3YH2D\11[1].exe
  • <SYSTEM32>\11.exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\0D6B6PI5\10[1].exe
  • <SYSTEM32>\8.exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\9[1].exe
  • <SYSTEM32>\9.exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\SL6TKFAX\12[1].exe
  • <SYSTEM32>\14.exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\ULU3YH2D\15[1].exe
  • <SYSTEM32>\15.exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\0D6B6PI5\14[1].exe
  • <SYSTEM32>\12.exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\13[1].exe
  • <SYSTEM32>\13.exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\SL6TKFAX\8[1].exe
  • <SYSTEM32>\2.exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\ULU3YH2D\3[1].exe
  • <SYSTEM32>\3.exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\0D6B6PI5\2[1].exe
  • <SYSTEM32>\Deleteme.bat
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\1[1].exe
  • <SYSTEM32>\1.exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\SL6TKFAX\4[1].exe
  • <SYSTEM32>\6.exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\ULU3YH2D\7[1].exe
  • <SYSTEM32>\7.exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\0D6B6PI5\6[1].exe
  • <SYSTEM32>\4.exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\5[1].exe
  • <SYSTEM32>\5.exe
Deletes itself.
Network activity:
Connects to:
  • 'www.87##72.cn':80
  • 'localhost':1037
TCP:
HTTP GET requests:
  • www.87##72.cn/11.exe
  • www.87##72.cn/10.exe
  • www.87##72.cn/9.exe
  • www.87##72.cn/12.exe
  • www.87##72.cn/15.exe
  • www.87##72.cn/14.exe
  • www.87##72.cn/13.exe
  • www.87##72.cn/8.exe
  • www.87##72.cn/3.exe
  • www.87##72.cn/2.exe
  • www.87##72.cn/1.exe
  • www.87##72.cn/4.exe
  • www.87##72.cn/7.exe
  • www.87##72.cn/6.exe
  • www.87##72.cn/5.exe
UDP:
  • DNS ASK www.87##72.cn
Miscellaneous:
Searches for the following windows:
  • ClassName: 'Shell_TrayWnd' WindowName: ''