JavaScript support is required for our site to be fully operational in your browser.
Win32.HLLW.Bice.8
Added to the Dr.Web virus database:
2009-04-10
Virus description added:
2013-09-12
Technical Information
Malicious functions:
To bypass firewall, removes or modifies the following registry keys:
[<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '<Full path to virus>' = '<Full path to virus>:*:Enabled:360安全卫士-安装'
Modifies file system :
Creates the following files:
%TEMP%\{DB7BA59E-DE4F-40e0-A99A-F1993F19A723}.tmp
%TEMP%\!@t1.tmp.P2P
%TEMP%\C__DOCUME~1_%USERNAME%_LOCALS~1_Temp_!@t1.tmp.mem
%TEMP%\{B1084913-57A0-47bb-A707-748BF155E6CC}.tmp
%TEMP%\{432C1078-3D34-462b-9FBF-91DF3D3527B1}.tmp
%TEMP%\{01AEB95C-940C-4441-B4B2-ADD0256C46A1}.tmp\360P2SP.dll
%TEMP%\{01AEB95C-940C-4441-B4B2-ADD0256C46A1}.tmp\liveupdatelog\P2SP_<Virus name>.log
Deletes the following files:
%TEMP%\C__DOCUME~1_%USERNAME%_LOCALS~1_Temp_!@t1.tmp.mem
%TEMP%\{432C1078-3D34-462b-9FBF-91DF3D3527B1}.tmp
Moves the following files:
from %TEMP%\!@t1.tmp.P2P to %TEMP%\!@t1.tmp
Network activity:
Connects to:
'22#.#81.141.113':80
'up####.360safe.com':80
'pi###.360.cn':80
TCP:
HTTP GET requests:
up####.360safe.com/instcomp.htm?so##############################################################################################################################
22#.#81.141.113/index.html
up####.360safe.com/instcomp.htm?so#################################################################################################################################
pi###.360.cn/360safe/safe_home_new.cab
up####.360safe.com/instcomp.htm?so#############################################################################################################################
UDP:
DNS ASK up####.360safe.com
DNS ASK st####.sipphone.com
DNS ASK tr.#.360.cn
DNS ASK ag#.#.360.cn
DNS ASK st.#.360.cn
DNS ASK pi###.360.cn
'22#.#81.126.81':80
'st.#.360.cn':3478
'st####.sipphone.com':3478
Miscellaneous:
Searches for the following windows:
ClassName: 'Shell_TrayWnd' WindowName: '(null)'
欢迎下载 Dr.Web for Android
免费3个月
可使用所有保护组件
可在AppGallery/Google Pay延期
继续使用此网站意味着您同意我们使用Cookie文件和其他用于收集网站访问统计信息的技术手段。详细信息
OK