Meine Bibliothek
Meine Bibliothek

+ Zur Bibliothek hinzufügen

Support

Ihre Anfragen

Rufen Sie uns an

+7 (495) 789-45-86

Profil

Win32.HLLW.Autoruner2.14069

Added to the Dr.Web virus database: 2014-05-03

Virus description added:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'e35b3344e334d42c5b4c' = '<Full path to virus>'
Creates the following files on removable media:
  • <Drive name for removable media>:\autorun.inf
  • <Drive name for removable media>:\Winscript.exe
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
  • hidden files
Executes the following:
  • '%WINDIR%\Microsoft.NET\Framework\v2.0.50727\cvtres.exe' /NOLOGO /READONLY /MACHINE:IX86 "/OUT:%TEMP%\RES2.tmp" "%TEMP%\CSC1.tmp"
  • '%WINDIR%\Microsoft.NET\Framework\v2.0.50727\csc.exe' /noconfig /fullpaths @"%TEMP%\np3ryzgm.cmdline"
Modifies file system :
Creates the following files:
  • <LS_APPDATA>\IsolatedStorage\terarmdr.rgq\wnnj3ic1.vam\Url.5onwpfvub4v44rwizch0i455ojp1jwus\AssemFiles\89512251\Usages.bin
  • <LS_APPDATA>\IsolatedStorage\terarmdr.rgq\wnnj3ic1.vam\Url.5onwpfvub4v44rwizch0i455ojp1jwus\info.dat
  • <LS_APPDATA>\IsolatedStorage\terarmdr.rgq\wnnj3ic1.vam\Url.5onwpfvub4v44rwizch0i455ojp1jwus\AssemFiles\89512251\D\UGxhdGZvcm06IFdpbmRvd3MgWFA=.bin
  • <LS_APPDATA>\IsolatedStorage\terarmdr.rgq\wnnj3ic1.vam\Url.5onwpfvub4v44rwizch0i455ojp1jwus\AssemFiles\89512251\D\UGxhdGZvcm06IC5ORVQgNC4wIGluc3RhbGxlZA==.bin
  • <LS_APPDATA>\IsolatedStorage\terarmdr.rgq\wnnj3ic1.vam\Url.5onwpfvub4v44rwizch0i455ojp1jwus\identity.dat
  • %HOMEPATH%\My Documents\Downloads\Windows NT.exe
  • %HOMEPATH%\My Documents\Downloads\Windows Media Player.exe
  • %HOMEPATH%\My Documents\Downloads\xerox.exe
  • %HOMEPATH%\My Documents\Downloads\WindowsUpdate.exe
  • %TEMP%\CSC1.tmp
  • %TEMP%\np3ryzgm.out
  • %TEMP%\np3ryzgm.dll
  • %TEMP%\RES2.tmp
  • %TEMP%\np3ryzgm.cmdline
  • <LS_APPDATA>\IsolatedStorage\terarmdr.rgq\wnnj3ic1.vam\Url.5onwpfvub4v44rwizch0i455ojp1jwus\AssemFiles\89512251\D\UGxhdGZvcm0gQ3VsdHVyZSBOYW1lOiBlbi1VUw==.bin
  • <LS_APPDATA>\IsolatedStorage\terarmdr.rgq\wnnj3ic1.vam\Url.5onwpfvub4v44rwizch0i455ojp1jwus\AssemFiles\89512251\D\UGxhdGZvcm0gQ1BVIENvcmVzOiAy.bin
  • %TEMP%\np3ryzgm.0.cs
  • <LS_APPDATA>\IsolatedStorage\terarmdr.rgq\wnnj3ic1.vam\Url.5onwpfvub4v44rwizch0i455ojp1jwus\AssemFiles\89512251\D\UGxhdGZvcm0gT1MgQml0bmVzczogMzI=.bin
  • %HOMEPATH%\My Documents\Downloads\Messenger.exe
  • %HOMEPATH%\My Documents\Downloads\Internet Explorer.exe
  • %HOMEPATH%\My Documents\Downloads\Microsoft.NET.exe
  • %HOMEPATH%\My Documents\Downloads\microsoft frontpage.exe
  • %HOMEPATH%\My Documents\Downloads\FireFox.exe
  • C:\autorun.inf
  • C:\Winscript.exe
  • %HOMEPATH%\My Documents\Downloads\ComPlus Applications.exe
  • %HOMEPATH%\My Documents\Downloads\Common Files.exe
  • %HOMEPATH%\My Documents\Downloads\Outlook Express.exe
  • %HOMEPATH%\My Documents\Downloads\Online Services.exe
  • %HOMEPATH%\My Documents\Downloads\Uninstall Information.exe
  • %HOMEPATH%\My Documents\Downloads\Reference Assemblies.exe
  • %HOMEPATH%\My Documents\Downloads\NetMeeting.exe
  • %HOMEPATH%\My Documents\Downloads\MSBuild.exe
  • %HOMEPATH%\My Documents\Downloads\Movie Maker.exe
  • %HOMEPATH%\My Documents\Downloads\MSN Gaming Zone.exe
  • %HOMEPATH%\My Documents\Downloads\MSN.exe
Sets the 'hidden' attribute to the following files:
  • <Drive name for removable media>:\autorun.inf
  • <Drive name for removable media>:\Winscript.exe
  • C:\autorun.inf
  • C:\Winscript.exe
Deletes the following files:
  • %TEMP%\np3ryzgm.cmdline
  • %TEMP%\np3ryzgm.dll
  • %TEMP%\np3ryzgm.0.cs
  • %TEMP%\RES2.tmp
  • %TEMP%\CSC1.tmp
  • %TEMP%\np3ryzgm.out
Network activity:
Connects to:
  • 'sa######vice.red-gate.com':80
  • 'wp#d':80
  • 'al#####2014.no-ip.biz':5050
TCP:
HTTP GET requests:
  • wp#d/wpad.dat
UDP:
  • DNS ASK sa######vice.red-gate.com
  • DNS ASK wp#d
  • DNS ASK al#####2014.no-ip.biz
Miscellaneous:
Searches for the following windows:
  • ClassName: 'Indicator' WindowName: '(null)'