Um eine korrekte Funktionsweise unserer Website zu gewährleisten, müssen Sie die Unterstützung für JavaScript in Ihrem Browser aktivieren.
Win32.HLLW.Autoruner2.17550
Added to the Dr.Web virus database:
2014-10-02
Virus description added:
2014-10-02
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'c' = 'wscript.exe //B "%TEMP%\c.vbs"'
[<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'c' = 'wscript.exe //B "%TEMP%\c.vbs"'
[<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce] 'wextract_cleanup0' = 'rundll32.exe <SYSTEM32>\advpack.dll,DelNodeRunDLL32 "%TEMP%\IXP000.TMP\"'
[<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce] 'wextract_cleanup1' = 'rundll32.exe <SYSTEM32>\advpack.dll,DelNodeRunDLL32 "%TEMP%\IXP001.TMP\"'
Creates or modifies the following files:
%HOMEPATH%\Start Menu\Programs\Startup\c.vbs
Creates the following files on removable media:
<Drive name for removable media>:\svchost.lnk
<Drive name for removable media>:\svchost.exe
<Drive name for removable media>:\c.vbs
Malicious functions:
Creates and executes the following:
'%TEMP%\gFaZU.exe' /stext %TEMP%\pass.txt
'%TEMP%\IXP000.TMP\u.exe'
'%TEMP%\IXP000.TMP\aw.EXE'
'%TEMP%\IXP001.TMP\s.exe'
'%TEMP%\gFaZU.exe' (downloaded from the Internet)
Executes the following:
'<SYSTEM32>\wscript.exe' //B "%TEMP%\c.vbs"
'<SYSTEM32>\wscript.exe' c.vbs
Modifies file system :
Creates the following files:
%HOMEPATH%\My Documents\Downloads\Uninstall Information.exe
%HOMEPATH%\My Documents\Downloads\Reference Assemblies.exe
%HOMEPATH%\My Documents\Downloads\Windows NT.exe
%HOMEPATH%\My Documents\Downloads\Windows Media Player.exe
%HOMEPATH%\My Documents\Downloads\NetMeeting.exe
%HOMEPATH%\My Documents\Downloads\MSN Gaming Zone.exe
%HOMEPATH%\My Documents\Downloads\Outlook Express.exe
%HOMEPATH%\My Documents\Downloads\Online Services.exe
%APPDATA%\uTorrent\settings.dat.new
%HOMEPATH%\Cookies\%USERNAME%@localhost[1].txt
%APPDATA%\uTorrent\toolbar.benc.new
%TEMP%\utt1.tmp.new
%HOMEPATH%\My Documents\Downloads\xerox.exe
%HOMEPATH%\My Documents\Downloads\WindowsUpdate.exe
%APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2052111302-484763869-725345543-1003\1f91d2d17ea675d4c2c3192e241743f9_23ef5514-3059-436f-a4a7-4cefaab20eb1
%TEMP%\gFaZU.exe
%TEMP%\c.vbs
%HOMEPATH%\My Documents\Downloads\ComPlus Applications.exe
%HOMEPATH%\My Documents\Downloads\Common Files.exe
%TEMP%\IXP000.TMP\u.exe
%TEMP%\IXP000.TMP\aw.EXE
%TEMP%\IXP001.TMP\s.exe
%TEMP%\IXP001.TMP\c.vbs
%HOMEPATH%\My Documents\Downloads\Movie Maker.exe
%HOMEPATH%\My Documents\Downloads\Microsoft.NET.exe
%HOMEPATH%\My Documents\Downloads\MSN.exe
%HOMEPATH%\My Documents\Downloads\MSBuild.exe
%HOMEPATH%\My Documents\Downloads\Internet Explorer.exe
%HOMEPATH%\My Documents\Downloads\FireFox.exe
%HOMEPATH%\My Documents\Downloads\microsoft frontpage.exe
%HOMEPATH%\My Documents\Downloads\Messenger.exe
Sets the 'hidden' attribute to the following files:
<Drive name for removable media>:\svchost.exe
%TEMP%\gFaZU.exe
<Drive name for removable media>:\c.vbs
Deletes the following files:
%TEMP%\IXP001.TMP\c.vbs
%TEMP%\IXP001.TMP\s.exe
%TEMP%\gFaZU.exe
Moves the following files:
from %APPDATA%\uTorrent\toolbar.benc.new to %APPDATA%\uTorrent\toolbar.benc
from %TEMP%\utt1.tmp.new to %TEMP%\utt1.tmp
from %APPDATA%\uTorrent\settings.dat.new to %APPDATA%\uTorrent\settings.dat
Network activity:
Connects to:
'localhost':1043
'st###.user32.com':3333
'up####.utorrent.li':80
'up####.utorrent.com':80
'ch####p.dyndns.org':80
'wp#d':80
'up.###-point.com':80
'localhost':1039
TCP:
HTTP GET requests:
up####.utorrent.com/installoffer.php?h=############################################################################################
up####.utorrent.li/installstats.php?cl#############################################################################################################################################################
up####.utorrent.li/installstats.php?cl###########################################################################################################################
wp#d/wpad.dat
ch####p.dyndns.org/
up.###-point.com/uploads/da80250496e71.png
UDP:
DNS ASK ro####.bittorrent.com
DNS ASK ro####.utorrent.com
DNS ASK up####.utorrent.li
DNS ASK up####.utorrent.com
DNS ASK ch####p.dyndns.org
DNS ASK wp#d
DNS ASK st###.user32.com
DNS ASK up.###-point.com
Miscellaneous:
Searches for the following windows:
ClassName: 'µTorrent4823DF041B09' WindowName: ''
ClassName: 'Shell_TrayWnd' WindowName: ''
ClassName: 'Indicator' WindowName: ''
ClassName: '?Torrent4823DF041B09' WindowName: ''
Laden Sie Dr.Web für Android herunter
Kostenlos für 3 Monate
Alle Schutzkomponenten
Verlängerung der Testversion über AppGallery/Google Pay
Wenn Sie diese Webseite weiter benutzen, bedeutet dies, dass Sie mit der Verarbeitung von Cookies sowie dem Einsatz anderer Technologien zur Sammlung von statistischen Nutzerdaten einverstanden sind. Mehr dazu
OK