Mi biblioteca
Mi biblioteca

+ Añadir a la biblioteca

Soporte
Soporte 24 horas | Normas de contactar

Sus solicitudes

Perfil

Win32.HLLW.Autoruner.52671

Added to the Dr.Web virus database: 2011-06-26

Virus description added:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ravmond.exe] 'Debugger' = 'c:\\ОТѕНІ»ёшДгЖф¶Ї.exe'
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ravmon.exe] 'Debugger' = 'c:\\ОТѕНІ»ёшДгЖф¶Ї.exe'
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ravtask.exe] 'Debugger' = 'c:\\ОТѕНІ»ёшДгЖф¶Ї.exe'
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ravstub.exe] 'Debugger' = 'c:\\ОТѕНІ»ёшДгЖф¶Ї.exe'
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'system' = 'interneter.exe'
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safe.exe] 'Debugger' = 'c:\\ОТѕНІ»ёшДгЖф¶Ї.exe'
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe] 'Debugger' = 'c:\\ОТѕНІ»ёшДгЖф¶Ї.exe'
Creates the following files on removable media:
  • <Drive name for removable media>:\autorun.inf
  • <Drive name for removable media>:\autorun.exe
Malicious functions:
Creates and executes the following:
  • %PROGRAM_FILES%\Internet Explorer\14.exe (downloaded from the Internet) 
  • %PROGRAM_FILES%\Internet Explorer\15.exe (downloaded from the Internet) 
  • %PROGRAM_FILES%\Internet Explorer\13.exe (downloaded from the Internet) 
  • %PROGRAM_FILES%\Internet Explorer\11.exe (downloaded from the Internet) 
  • %PROGRAM_FILES%\Internet Explorer\12.exe (downloaded from the Internet) 
  • %PROGRAM_FILES%\Internet Explorer\19.exe (downloaded from the Internet) 
  • %PROGRAM_FILES%\Internet Explorer\20.exe (downloaded from the Internet) 
  • %PROGRAM_FILES%\Internet Explorer\18.exe (downloaded from the Internet) 
  • %PROGRAM_FILES%\Internet Explorer\16.exe (downloaded from the Internet) 
  • %PROGRAM_FILES%\Internet Explorer\17.exe (downloaded from the Internet) 
  • %PROGRAM_FILES%\Internet Explorer\4.exe (downloaded from the Internet) 
  • %PROGRAM_FILES%\Internet Explorer\5.exe (downloaded from the Internet) 
  • %PROGRAM_FILES%\Internet Explorer\3.exe (downloaded from the Internet) 
  • %PROGRAM_FILES%\Internet Explorer\1.exe (downloaded from the Internet) 
  • %PROGRAM_FILES%\Internet Explorer\2.exe (downloaded from the Internet) 
  • %PROGRAM_FILES%\Internet Explorer\9.exe (downloaded from the Internet) 
  • %PROGRAM_FILES%\Internet Explorer\10.exe (downloaded from the Internet) 
  • %PROGRAM_FILES%\Internet Explorer\8.exe (downloaded from the Internet) 
  • %PROGRAM_FILES%\Internet Explorer\6.exe (downloaded from the Internet) 
  • %PROGRAM_FILES%\Internet Explorer\7.exe (downloaded from the Internet) 
Executes the following:
  • <SYSTEM32>\taskkill.exe /im 360tray.exe /f
  • <SYSTEM32>\taskkill.exe /im 360safe.exe /f
Injects code into
the following system processes:
  • %WINDIR%\Explorer.EXE
Modifies file system :
Creates the following files:
  • %PROGRAM_FILES%\Internet Explorer\13.exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\13[1].exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\0D6B6PI5\14[1].exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\ULU3YH2D\15[1].exe
  • %PROGRAM_FILES%\Internet Explorer\14.exe
  • %PROGRAM_FILES%\Internet Explorer\12.exe
  • %PROGRAM_FILES%\Internet Explorer\10.exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\0D6B6PI5\10[1].exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\ULU3YH2D\11[1].exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\SL6TKFAX\12[1].exe
  • %PROGRAM_FILES%\Internet Explorer\11.exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\ULU3YH2D\19[1].exe
  • %PROGRAM_FILES%\Internet Explorer\18.exe
  • %PROGRAM_FILES%\Internet Explorer\19.exe
  • %PROGRAM_FILES%\Internet Explorer\20.exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\SL6TKFAX\20[1].exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\0D6B6PI5\18[1].exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\SL6TKFAX\16[1].exe
  • %PROGRAM_FILES%\Internet Explorer\15.exe
  • %PROGRAM_FILES%\Internet Explorer\16.exe
  • %PROGRAM_FILES%\Internet Explorer\17.exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\17[1].exe
  • %PROGRAM_FILES%\Internet Explorer\9.exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\0D6B6PI5\2[1].exe
  • %PROGRAM_FILES%\Internet Explorer\1.exe
  • %PROGRAM_FILES%\Internet Explorer\2.exe
  • %PROGRAM_FILES%\Internet Explorer\3.exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\ULU3YH2D\3[1].exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\1[1].exe
  • C:\autorun.exe
  • <SYSTEM32>\Autorun.inf
  • C:\autorun.inf
  • <SYSTEM32>\interneter.exe
  • <SYSTEM32>\Autorun.exe
  • %PROGRAM_FILES%\Internet Explorer\7.exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\ULU3YH2D\7[1].exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\SL6TKFAX\8[1].exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\9[1].exe
  • %PROGRAM_FILES%\Internet Explorer\8.exe
  • %PROGRAM_FILES%\Internet Explorer\6.exe
  • %PROGRAM_FILES%\Internet Explorer\4.exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\SL6TKFAX\4[1].exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\5[1].exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\0D6B6PI5\6[1].exe
  • %PROGRAM_FILES%\Internet Explorer\5.exe
Sets the 'hidden' attribute to the following files:
  • <SYSTEM32>\Autorun.inf
  • <Drive name for removable media>:\autorun.exe
  • <Drive name for removable media>:\autorun.inf
  • C:\autorun.exe
  • C:\autorun.inf
  • <SYSTEM32>\Autorun.exe
Network activity:
Connects to:
  • 'do##.dxj520.cn':80
  • 'localhost':1036
TCP:
HTTP GET requests:
  • do##.dxj520.cn/down/14.exe
  • do##.dxj520.cn/down/15.exe
  • do##.dxj520.cn/down/13.exe
  • do##.dxj520.cn/down/11.exe
  • do##.dxj520.cn/down/12.exe
  • do##.dxj520.cn/down/19.exe
  • do##.dxj520.cn/down/20.exe
  • do##.dxj520.cn/down/18.exe
  • do##.dxj520.cn/down/16.exe
  • do##.dxj520.cn/down/17.exe
  • do##.dxj520.cn/down/4.exe
  • do##.dxj520.cn/down/5.exe
  • do##.dxj520.cn/down/3.exe
  • do##.dxj520.cn/down/1.exe
  • do##.dxj520.cn/down/2.exe
  • do##.dxj520.cn/down/9.exe
  • do##.dxj520.cn/down/10.exe
  • do##.dxj520.cn/down/8.exe
  • do##.dxj520.cn/down/6.exe
  • do##.dxj520.cn/down/7.exe
UDP:
  • DNS ASK do##.dxj520.cn
Miscellaneous:
Searches for the following windows:
  • ClassName: '' WindowName: ''
  • ClassName: 'Shell_TrayWnd' WindowName: ''