Bibliothèque
Ma bibliothèque

+ Ajouter à la bibliothèque

Contacter-nous !
Support 24/24 | Rules regarding submitting

Nous téléphoner

0 825 300 230

Forum

Vos requêtes

  • Toutes : -
  • Non clôturées : -
  • Dernière : le -

Nous téléphoner

0 825 300 230

Profil

Win32.HLLW.Autoruner2.16353

Added to the Dr.Web virus database: 2014-07-23

Virus description added:

Technical Information

To ensure autorun and distribution:
Creates or modifies the following files:
  • %HOMEPATH%\Start Menu\Programs\Startup\Internet.exe
Malicious functions:
Creates and executes the following:
  • '%TEMP%\ProgDVB7.06.1Pro.exe'
  • '%TEMP%\Internet.exe'
Executes the following:
  • '%WINDIR%\Microsoft.NET\Framework\v2.0.50727\csc.exe' /noconfig /fullpaths @"%TEMP%\qiusdw7o.cmdline"
  • '%WINDIR%\Microsoft.NET\Framework\v2.0.50727\cvtres.exe' /NOLOGO /READONLY /MACHINE:IX86 "/OUT:%TEMP%\RESA.tmp" "%TEMP%\CSC9.tmp"
  • '%WINDIR%\Microsoft.NET\Framework\v2.0.50727\csc.exe' /noconfig /fullpaths @"%TEMP%\_acjceq4.cmdline"
  • '%WINDIR%\Microsoft.NET\Framework\v2.0.50727\cvtres.exe' /NOLOGO /READONLY /MACHINE:IX86 "/OUT:%TEMP%\RES8.tmp" "%TEMP%\CSC7.tmp"
Modifies file system :
Creates the following files:
  • <LS_APPDATA>\IsolatedStorage\wdi3xij5.sfh\rae1vrwe.o1i\Url.d3shnotau42tcmwdxgkzyl0xms3ucy20\AssemFiles\F6F13A29\D\UGxhdGZvcm0gT1MgQml0bmVzczogMzI=.bin
  • <LS_APPDATA>\IsolatedStorage\wdi3xij5.sfh\rae1vrwe.o1i\Url.d3shnotau42tcmwdxgkzyl0xms3ucy20\AssemFiles\F6F13A29\D\UGxhdGZvcm0gQ3VsdHVyZSBOYW1lOiBlbi1VUw==.bin
  • %TEMP%\_acjceq4.cmdline
  • %TEMP%\_acjceq4.0.cs
  • <LS_APPDATA>\IsolatedStorage\wdi3xij5.sfh\rae1vrwe.o1i\Url.d3shnotau42tcmwdxgkzyl0xms3ucy20\AssemFiles\F6F13A29\D\UGxhdGZvcm0gQ1BVIENvcmVzOiAy.bin
  • <LS_APPDATA>\IsolatedStorage\wdi3xij5.sfh\rae1vrwe.o1i\Url.d3shnotau42tcmwdxgkzyl0xms3ucy20\AssemFiles\F6F13A29\Usages.bin
  • <LS_APPDATA>\IsolatedStorage\wdi3xij5.sfh\rae1vrwe.o1i\Url.d3shnotau42tcmwdxgkzyl0xms3ucy20\info.dat
  • <LS_APPDATA>\IsolatedStorage\wdi3xij5.sfh\rae1vrwe.o1i\Url.d3shnotau42tcmwdxgkzyl0xms3ucy20\AssemFiles\F6F13A29\D\UGxhdGZvcm06IFdpbmRvd3MgWFA=.bin
  • <LS_APPDATA>\IsolatedStorage\wdi3xij5.sfh\rae1vrwe.o1i\Url.d3shnotau42tcmwdxgkzyl0xms3ucy20\AssemFiles\F6F13A29\D\UGxhdGZvcm06IC5ORVQgNC4wIGluc3RhbGxlZA==.bin
  • %TEMP%\_acjceq4.out
  • %TEMP%\CSC9.tmp
  • %TEMP%\qiusdw7o.out
  • %TEMP%\qiusdw7o.dll
  • %TEMP%\RESA.tmp
  • %TEMP%\qiusdw7o.cmdline
  • %TEMP%\RES8.tmp
  • %TEMP%\CSC7.tmp
  • %TEMP%\qiusdw7o.0.cs
  • %TEMP%\_acjceq4.dll
  • <LS_APPDATA>\IsolatedStorage\wdi3xij5.sfh\rae1vrwe.o1i\Url.d3shnotau42tcmwdxgkzyl0xms3ucy20\identity.dat
  • %TEMP%\nsc5.tmp
  • %WINDIR%\Internet.exe
  • %TEMP%\nsc6.tmp\MultiUserConfig.ini
  • %TEMP%\nsc6.tmp\QuickModePage.ini
  • %TEMP%\aut3.tmp
  • %TEMP%\Internet.exe
  • %TEMP%\aut1.tmp
  • %TEMP%\ProgDVB7.06.1Pro.exe
  • %TEMP%\aut2.tmp
  • %TEMP%\nsc6.tmp\SourceTypeConfig.ini
  • %TEMP%\nsc6.tmp\nsSCM.dll
  • %TEMP%\nsc6.tmp\Processes.dll
  • %TEMP%\nsc6.tmp\InstallOptions.dll
  • %TEMP%\nsc6.tmp\System.dll
  • %TEMP%\nsc6.tmp\modern-wizard.bmp
  • %TEMP%\nsc6.tmp\Configuration.ini
  • %TEMP%\nsc6.tmp\InterfaceConfiguration.ini
  • %TEMP%\nsc6.tmp\ioSpecial.ini
  • %TEMP%\nsc6.tmp\components.ini
Deletes the following files:
  • %TEMP%\_acjceq4.dll
  • %TEMP%\_acjceq4.0.cs
  • %TEMP%\_acjceq4.out
  • %TEMP%\CSC9.tmp
  • %TEMP%\RESA.tmp
  • %TEMP%\_acjceq4.cmdline
  • %TEMP%\aut2.tmp
  • %TEMP%\aut1.tmp
  • %TEMP%\aut3.tmp
  • %TEMP%\CSC7.tmp
  • %TEMP%\RES8.tmp
Network activity:
Connects to:
  • 'sa######vice.red-gate.com':80
  • 'is.gd':80
  • 'wp#d':80
TCP:
HTTP GET requests:
  • is.gd/M0Jbvl
  • wp#d/wpad.dat
UDP:
  • DNS ASK sa######vice.red-gate.com
  • DNS ASK is.gd
  • DNS ASK wp#d
Miscellaneous:
Searches for the following windows:
  • ClassName: 'Shell_TrayWnd' WindowName: '(null)'