Win32.HLLW.Pirog.13
Added to the Dr.Web virus database:
2013-10-19
Virus description added:
2013-10-19
Technical Information
To ensure autorun and distribution:
Creates the following services:
- [<HKLM>\SYSTEM\ControlSet001\services\scwinse] 'Start' = '00000002'
Malicious functions:
Creates and executes the following:
Executes the following:
- '<SYSTEM32>\wsqmcons.exe'
- '<SYSTEM32>\rundll32.exe' dfdts.dll,DfdGetDefaultPolicyAndSMART
- '<SYSTEM32>\schtasks.exe' /delete /f /TN "Microsoft\Windows\Customer Experience Improvement Program\Uploader"
- '<SYSTEM32>\sc.exe' start w32time task_started
- '<SYSTEM32>\sdclt.exe' /CONFIGNOTIFICATION
- '<SYSTEM32>\taskhost.exe' $(Arg0)
Modifies file system :
Creates the following files:
- C:\ProgramData\Microsoft\RAC\Temp\sqlBE3F.tmp
- C:\ProgramData\Microsoft\RAC\Temp\sqlBF1B.tmp
- C:\ProgramData\dkjdsvcwinsgf.ini
- %WINDIR%\scwinse.exe
- <SYSTEM32>\config\systemprofile\AppData\Roaming\scwinsdsessd.ini
Sets the 'hidden' attribute to the following files:
- C:\ProgramData\dkjdsvcwinsgf.ini
Deletes the following files:
- C:\ProgramData\Microsoft\RAC\Temp\sqlBE3F.tmp
- C:\ProgramData\Microsoft\RAC\Temp\sqlBF1B.tmp
Moves itself:
- from <Full path to virus> to <Full path to virus>27154
Network activity:
Connects to:
- '37.##.224.161':61174
- '37.##.224.161':62573
- '37.##.224.161':63373
- '37.##.224.161':64472
- '37.##.224.161':60872
- '37.##.224.161':63872
- '17#.#2.63.159':80
- '37.##.224.161':61874
- '37.##.224.161':62873
TCP:
UDP:
- DNS ASK ti##.#indows.com
- 'ti##.#indows.com':123
欢迎下载
Dr.Web for Android
-
免费3个月
-
可使用所有保护组件
-
可在AppGallery/Google Pay延期
继续使用此网站意味着您同意我们使用Cookie文件和其他用于收集网站访问统计信息的技术手段。详细信息