Win32.HLLW.Autoruner1.52072
Added to the Dr.Web virus database:
2013-07-23
Virus description added:
2013-07-25
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'ctfmon.exe' = 'C:\PROGRA~2\rundll32.exe C:\PROGRA~2\jmcoaf.dat,FG00'
Infects the following executable system files:
- %WINDIR%\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll
Malicious functions:
Executes the following:
- '<SYSTEM32>\taskhost.exe' $(Arg0)
- '<SYSTEM32>\wermgr.exe' -queuereporting
- '<SYSTEM32>\taskhost.exe'
- '<SYSTEM32>\ctfmon.exe'
Modifies settings of Windows Internet Explorer:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1] '2500' = '00000003'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0] '2500' = '00000003'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2] '2500' = '00000003'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4] '2500' = '00000003'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3] '2500' = '00000003'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1] '1609' = '00000000'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0] '1609' = '00000000'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2] '1609' = '00000000'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4] '1609' = '00000000'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3] '1609' = '00000000'
Modifies file system :
Creates the following files:
- <LS_APPDATA>\Microsoft\Media Player\Art Cache\LocalMLS\{882E5844-4F08-485B-A913-CCAD8F180AEC}.jpg
- <LS_APPDATA>\Microsoft\Media Player\Art Cache\LocalMLS\{44C6560E-E799-455A-98BE-3866FF915916}.jpg
- C:\Users\Public\Music\Sample Music\AlbumArt_{5FA05D35-A682-4AF6-96F7-0773E42D4D16}_Small.jpg
- C:\Users\Public\Music\Sample Music\Folder.jpg
- C:\Users\Public\Music\Sample Music\AlbumArt_{5FA05D35-A682-4AF6-96F7-0773E42D4D16}_Large.jpg
- <LS_APPDATA>\Microsoft\Windows\Temporary Internet Files\Content.IE5\BOWDBRP7\getmdrcdbackground[1]
- C:\ProgramData\Microsoft\RAC\Temp\sqlC6A8.tmp
- C:\ProgramData\Microsoft\RAC\Temp\sqlC6C8.tmp
- <LS_APPDATA>\Microsoft\Windows\Temporary Internet Files\Content.IE5\YF7T7AK2\IE9CompatViewList[1].xml
- <LS_APPDATA>\Microsoft\Windows\Temporary Internet Files\Content.IE5\SOXZEUJX\getmdrcdposturlbackground[1]
- <LS_APPDATA>\Microsoft\Windows\Temporary Internet Files\Content.IE5\6P5SDOMI\getmdrcdposturlbackground[1]
- C:\ProgramData\faocmj.pad
- C:\ProgramData\faocmj.js
- C:\ProgramData\rundll32.exe
- C:\ProgramData\jmcoaf.dat
- C:\ProgramData\Microsoft\RAC\Temp\sql8536.tmp
- <LS_APPDATA>\Microsoft\Windows\Temporary Internet Files\Content.IE5\YF7T7AK2\allservices[1]
- C:\Users\Public\Music\Sample Music\AlbumArtSmall.jpg
- <LS_APPDATA>\Microsoft\Windows\Temporary Internet Files\Content.IE5\6P5SDOMI\fwlink[1]
- C:\ProgramData\Microsoft\RAC\Temp\sql8516.tmp
- %APPDATA%\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\msconfig.lnk
Sets the 'hidden' attribute to the following files:
- C:\Users\Public\Music\Sample Music\AlbumArt_{5FA05D35-A682-4AF6-96F7-0773E42D4D16}_Small.jpg
- <LS_APPDATA>\Microsoft\Media Player\Art Cache\LocalMLS\{882E5844-4F08-485B-A913-CCAD8F180AEC}.jpg
- <LS_APPDATA>\Microsoft\Media Player\Art Cache\LocalMLS\{44C6560E-E799-455A-98BE-3866FF915916}.jpg
- C:\Users\Public\Music\Sample Music\AlbumArtSmall.jpg
- C:\Users\Public\Music\Sample Music\Folder.jpg
- C:\Users\Public\Music\Sample Music\AlbumArt_{5FA05D35-A682-4AF6-96F7-0773E42D4D16}_Large.jpg
Deletes the following files:
- C:\ProgramData\Microsoft\RAC\Temp\sql8516.tmp
- C:\ProgramData\Microsoft\RAC\Temp\sql8536.tmp
Network activity:
Connects to:
- '66.##7.215.165':443
- 'localhost':51670
- 'wh###illber.com':443
- 'localhost':54473
- '66.##7.217.85':443
- 'localhost':58919
- '66.##7.217.85':80
- '20#.#6.232.182':443
- '20#.#6.232.182':80
TCP:
HTTP GET requests:
- 20#.#6.232.182/redir/getmdrcdposturlbackground/?lo#######################################################################################################
- 20#.#6.232.182/IE9CompatViewList.xml
- 20#.#6.232.182/redir/getmdrcdbackground/?lo##################################################################################################
- 20#.#6.232.182/fwlink/?Li##########
- 20#.#6.232.182/redir/allservices/?sv#############################################################
UDP:
- DNS ASK ie######t.ie.microsoft.com
- DNS ASK wh###illber.com
- DNS ASK dn#.##ftncsi.com
- DNS ASK re###.####services.microsoft.com
- DNS ASK go.###rosoft.com
- DNS ASK ur#.##crosoft.com
- '23#.#55.255.250':1900
Miscellaneous:
Searches for the following windows:
- ClassName: 'MS_WebCheckMonitor' WindowName: '(null)'
- ClassName: '' WindowName: '(null)'
- ClassName: 'Type32_Main_Window' WindowName: '(null)'
- ClassName: 'Indicator' WindowName: '(null)'
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'
- ClassName: 'MS_AutodialMonitor' WindowName: '(null)'
欢迎下载
Dr.Web for Android
-
免费3个月
-
可使用所有保护组件
-
可在AppGallery/Google Pay延期
继续使用此网站意味着您同意我们使用Cookie文件和其他用于收集网站访问统计信息的技术手段。详细信息