Bibliothèque
Ma bibliothèque

+ Ajouter à la bibliothèque

Contacter-nous !
Support 24/24 | Rules regarding submitting

Nous téléphoner

0 825 300 230

Forum

Vos requêtes

  • Toutes : -
  • Non clôturées : -
  • Dernière : le -

Nous téléphoner

0 825 300 230

Profil

Win32.HLLW.Autoruner2.273

Added to the Dr.Web virus database: 2013-12-26

Virus description added:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce] 'Intel(R) Common User Interface' = '"%PROGRAM_FILES%\FireFox\defaults\profile\igfxpers.exe"'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\RunOnce] 'AppExtender' = '"%CommonProgramFiles%\ODBC\AppExtB.exe"'
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Bluetooth Software' = '"%PROGRAM_FILES%\Reference Assemblies\Microsoft\Framework\BtvStack.exe"'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'IntelAPMClient' = '"%PROGRAM_FILES%\Windows Media Player\Sample Playlists\amclient.exe"'
Creates or modifies the following files:
  • %ALLUSERSPROFILE%\Start Menu\Programs\Startup\ccSetMgr.exe
Creates the following files on removable media:
  • <Drive name for removable media>:\autorun.exe
  • <Drive name for removable media>:\autorun.inf
Malicious functions:
Creates and executes the following:
  • '%TEMP%\almon.exe'
  • '%TEMP%\Belkinwcui.exe'
  • '%TEMP%\almon.exe' (downloaded from the Internet)
  • '%TEMP%\Belkinwcui.exe' (downloaded from the Internet)
Executes the following:
  • '<SYSTEM32>\schtasks.exe' /CREATE /F /RL HIGHEST /SC MINUTE /MO 17 /TN "AppExtender" /TR "\"%CommonProgramFiles%\ODBC\AppExtB.exe\""
  • '<SYSTEM32>\schtasks.exe' /CREATE /F /SC ONLOGON /TN "ComAgent" /TR "\"%PROGRAM_FILES%\FireFox\chrome\toolkit\skin\classic\global\ComAgent.exe\""
  • '<SYSTEM32>\schtasks.exe' /CREATE /F /RL HIGHEST /SC MINUTE /MO 15 /TN "Intel(R) Common User Interface" /TR "\"%PROGRAM_FILES%\FireFox\defaults\profile\igfxpers.exe\""
  • '<SYSTEM32>\schtasks.exe' /CREATE /F /RL HIGHEST /SC MINUTE /MO 7 /TN "Bluetooth Software" /TR "\"%PROGRAM_FILES%\Reference Assemblies\Microsoft\Framework\BtvStack.exe\""
  • '<SYSTEM32>\schtasks.exe' /CREATE /F /RL HIGHEST /SC MINUTE /MO 17 /TN "IntelAPMClient" /TR "\"%PROGRAM_FILES%\Windows Media Player\Sample Playlists\amclient.exe\""
Modifies file system :
Creates the following files:
  • %PROGRAM_FILES%\FireFox\chrome\en-US\locale\en-US\passwordmgr\~rbqcqcf.tmp
  • %PROGRAM_FILES%\FireFox\chrome\en-US\locale\en-US\passwordmgr\almon.exe
  • %PROGRAM_FILES%\FireFox\chrome\toolkit\skin\classic\global\ComAgent.exe
  • %CommonProgramFiles%\ODBC\AppExtB.exe
  • %PROGRAM_FILES%\FireFox\chrome\toolkit\skin\classic\global\~vizvvpd.tmp
  • %TEMP%\aut1.tmp
  • %TEMP%\almon.exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\good[1].php
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\java[1].exe
  • %TEMP%\~kyxazdr.tmp
  • %TEMP%\~a1e576dd.tmp
  • %CommonProgramFiles%\ODBC\~avzggpk.tmp
  • %CommonProgramFiles%\Microsoft Shared\MSInfo\~iiiflnp.tmp
  • %CommonProgramFiles%\Microsoft Shared\MSInfo\ccSetMgr.exe
  • %TEMP%\Belkinwcui.exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\version[1].txt
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\9d37560f22649cc740f3dcc7a381817f[1]
  • %PROGRAM_FILES%\Reference Assemblies\Microsoft\Framework\~wblagtn.tmp
  • %PROGRAM_FILES%\FireFox\defaults\profile\~cvmjjds.tmp
  • %PROGRAM_FILES%\FireFox\defaults\profile\igfxpers.exe
  • %PROGRAM_FILES%\Windows Media Player\Sample Playlists\amclient.exe
  • %PROGRAM_FILES%\Reference Assemblies\Microsoft\Framework\BtvStack.exe
  • %PROGRAM_FILES%\Windows Media Player\Sample Playlists\~vaflgjl.tmp
Sets the 'hidden' attribute to the following files:
  • <Drive name for removable media>:\autorun.inf
Deletes the following files:
  • %PROGRAM_FILES%\FireFox\chrome\toolkit\skin\classic\global\~vizvvpd.tmp
  • %PROGRAM_FILES%\FireFox\chrome\toolkit\skin\classic\global\ComAgent.exe
  • %CommonProgramFiles%\ODBC\~avzggpk.tmp
  • %CommonProgramFiles%\ODBC\AppExtB.exe
  • %PROGRAM_FILES%\FireFox\chrome\en-US\locale\en-US\passwordmgr\~rbqcqcf.tmp
  • %TEMP%\aut1.tmp
  • %TEMP%\~kyxazdr.tmp
  • %PROGRAM_FILES%\FireFox\chrome\en-US\locale\en-US\passwordmgr\almon.exe
  • <Drive name for removable media>:\autorun.exe
  • %ALLUSERSPROFILE%\Start Menu\Programs\Startup\ccSetMgr.exe
  • %PROGRAM_FILES%\Reference Assemblies\Microsoft\Framework\~wblagtn.tmp
  • %CommonProgramFiles%\Microsoft Shared\MSInfo\~iiiflnp.tmp
  • %CommonProgramFiles%\Microsoft Shared\MSInfo\ccSetMgr.exe
  • %PROGRAM_FILES%\Reference Assemblies\Microsoft\Framework\BtvStack.exe
  • %PROGRAM_FILES%\FireFox\defaults\profile\~cvmjjds.tmp
  • %PROGRAM_FILES%\FireFox\defaults\profile\igfxpers.exe
  • %PROGRAM_FILES%\Windows Media Player\Sample Playlists\~vaflgjl.tmp
  • %PROGRAM_FILES%\Windows Media Player\Sample Playlists\amclient.exe
Network activity:
Connects to:
  • 'gp##xy.com':80
  • 'up####.gpr0xy.com':80
TCP:
HTTP GET requests:
  • gp##xy.com/java.exe
  • gp##xy.com/good.php
  • up####.gpr0xy.com/version.txt
  • up####.gpr0xy.com/9d37560f22649cc740f3dcc7a381817f
UDP:
  • DNS ASK gp##xy.com
  • DNS ASK up####.gpr0xy.com
Miscellaneous:
Searches for the following windows:
  • ClassName: 'Indicator' WindowName: '(null)'