Mi biblioteca
Mi biblioteca

+ Añadir a la biblioteca

Soporte
Soporte 24 horas | Normas de contactar

Sus solicitudes

Perfil

Win32.HLLW.Autoruner1.18962

Added to the Dr.Web virus database: 2012-07-07

Virus description added:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKCU>\Control Panel\Desktop] 'SCRNSAVE.EXE' = '0x1.ab8901p-626ppdata\Microsoft\Windows\hR;.scr'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'docutl' = '%APPDATA%\docutl.exe'
Malicious functions:
Modifies settings of Windows Internet Explorer:
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings] 'ProxyOverride' = 'local'
  • [<HKLM>\SYSTEM\ControlSet001\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings] 'ProxyEnable' = '00000001'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings] 'ProxyEnable' = '00000001'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings] 'ProxyServer' = '127.0.0.1:5220'
Modifies file system :
Creates the following files:
  • %APPDATA%\0.dat
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\llllillllili[1].htm
Sets the 'hidden' attribute to the following files:
  • %APPDATA%\0.dat
Network activity:
Connects to:
  • '74.##5.232.51':80
  • 'll####lllili.info':80
  • 'localhost':5220
TCP:
HTTP GET requests:
  • 74.##5.232.51/
HTTP POST requests:
  • ll####lllili.info/
UDP:
  • DNS ASK google.com
  • DNS ASK ll####lllili.info
Miscellaneous:
Searches for the following windows:
  • ClassName: '' WindowName: 'RegCool'
  • ClassName: '' WindowName: 'System Configuration'
  • ClassName: 'Indicator' WindowName: ''
  • ClassName: '' WindowName: 'RegAlyzer'
  • ClassName: '' WindowName: 'System Restore'
  • ClassName: '' WindowName: 'Registry Editor'
  • ClassName: '' WindowName: 'Registry'