Mi biblioteca
Mi biblioteca

+ Añadir a la biblioteca

Soporte
Soporte 24 horas | Normas de contactar

Sus solicitudes

Perfil

Win32.HLLW.Rubbish.260

Added to the Dr.Web virus database: 2012-10-08

Virus description added:

Technical Information

Malicious functions:
Executes the following:
  • <SYSTEM32>\ipconfig.exe /all
Injects code into
the following system processes:
  • %WINDIR%\Explorer.EXE
Hooks the following functions in System Service Descriptor Table (SSDT):
  • NtQuerySystemInformation, handler: PCIDump.SYS
Modifies file system :
Creates the following files:
  • %WINDIR%\Temptemp.txt
  • %WINDIR%\Temp\000000000001.tmp
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\install[1].asp
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\index[1].txt
  • <DRIVERS>\pcidump.txt
  • %WINDIR%\Temp\mmhtml.dll
  • C:\kpp.log
Sets the 'hidden' attribute to the following files:
  • %WINDIR%\Temp\mmhtml.dll
Deletes the following files:
  • %WINDIR%\Temptemp.txt
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\install[1].asp
  • <DRIVERS>\pcidump.sys
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\index[1].txt
Moves the following files:
  • from <DRIVERS>\pcidump.txt to <DRIVERS>\pcidump.sys
Network activity:
Connects to:
  • 'www.xh##y.cn':80
  • 'ma.##pask.cn':80
  • 'localhost':1037
TCP:
HTTP GET requests:
  • www.xh##y.cn/install.asp
  • ma.##pask.cn/index.txt
UDP:
  • DNS ASK www.xh##y.cn
  • DNS ASK ma.##pask.cn