Win32.HLLW.Autoruner1.46293
Added to the Dr.Web virus database:
2013-07-14
Virus description added:
2013-07-14
Technical Information
To ensure autorun and distribution:
Creates or modifies the following files:
- %WINDIR%\Tasks\2r1gxeuviq.job
Malicious functions:
Executes the following:
- '<SYSTEM32>\wermgr.exe' -queuereporting
- '<SYSTEM32>\taskhost.exe' $(Arg0)
Modifies file system :
Creates the following files:
- <Current directory>\k1pr1op
- <SYSTEM32>\Tasks\2r1gxeuviq
- C:\ProgramData\Microsoft\RAC\Temp\sqlC62C.tmp
- C:\ProgramData\Microsoft\RAC\Temp\sqlC60C.tmp
- C:\ProgramData\Microsoft\RAC\Temp\sql8516.tmp
- C:\ProgramData\Microsoft\RAC\Temp\sql8536.tmp
- C:\ProgramData\Microsoft\Crypto\RSA\S-1-5-18\d42cc0c3858a58db2db37658219e6400_fdaad129-04df-4089-bb80-174ce725f721
- <SYSTEM32>\Microsoft\Protect\S-1-5-18\User\bcf8ded2-3db6-43e7-bbe5-c6e68e624ab0
Deletes the following files:
- C:\ProgramData\Microsoft\RAC\Temp\sql8516.tmp
- C:\ProgramData\Microsoft\RAC\Temp\sql8536.tmp
Network activity:
Connects to:
- 'cm###u93sdc.net':80
- 'kc###ewpr3n.com':80
- 'co##tpr.biz':80
TCP:
HTTP GET requests:
- cm###u93sdc.net/985/359.html
- kc###ewpr3n.com/543/61.html
- co##tpr.biz/153/507.html
- kc###ewpr3n.com/5/303.html
- co##tpr.biz/535/967.html
- co##tpr.biz/915/257.html
- co##tpr.biz/470/954.html
- co##tpr.biz/335/260.html
- kc###ewpr3n.com/702/842.html
- co##tpr.biz/955/805.html
- cm###u93sdc.net/878/351.html
UDP:
- DNS ASK cm###u93sdc.net
- DNS ASK kc###ewpr3n.com
- DNS ASK co##tpr.biz
欢迎下载
Dr.Web for Android
-
免费3个月
-
可使用所有保护组件
-
可在AppGallery/Google Pay延期
继续使用此网站意味着您同意我们使用Cookie文件和其他用于收集网站访问统计信息的技术手段。详细信息