Per il corretto funzionamento del sito, è necessario attivare il supporto di JavaScript nel browser.
Win32.HLLW.Bice.8
Aggiunto al database dei virus Dr.Web:
2009-04-10
La descrizione è stata aggiunta:
2013-09-12
Technical Information
Malicious functions:
To bypass firewall, removes or modifies the following registry keys:
[<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '<Full path to virus>' = '<Full path to virus>:*:Enabled:360安全卫士-安装'
Modifies file system :
Creates the following files:
%TEMP%\{DB7BA59E-DE4F-40e0-A99A-F1993F19A723}.tmp
%TEMP%\!@t1.tmp.P2P
%TEMP%\C__DOCUME~1_%USERNAME%_LOCALS~1_Temp_!@t1.tmp.mem
%TEMP%\{B1084913-57A0-47bb-A707-748BF155E6CC}.tmp
%TEMP%\{432C1078-3D34-462b-9FBF-91DF3D3527B1}.tmp
%TEMP%\{01AEB95C-940C-4441-B4B2-ADD0256C46A1}.tmp\360P2SP.dll
%TEMP%\{01AEB95C-940C-4441-B4B2-ADD0256C46A1}.tmp\liveupdatelog\P2SP_<Virus name>.log
Deletes the following files:
%TEMP%\C__DOCUME~1_%USERNAME%_LOCALS~1_Temp_!@t1.tmp.mem
%TEMP%\{432C1078-3D34-462b-9FBF-91DF3D3527B1}.tmp
Moves the following files:
from %TEMP%\!@t1.tmp.P2P to %TEMP%\!@t1.tmp
Network activity:
Connects to:
'22#.#81.141.113':80
'up####.360safe.com':80
'pi###.360.cn':80
TCP:
HTTP GET requests:
up####.360safe.com/instcomp.htm?so##############################################################################################################################
22#.#81.141.113/index.html
up####.360safe.com/instcomp.htm?so#################################################################################################################################
pi###.360.cn/360safe/safe_home_new.cab
up####.360safe.com/instcomp.htm?so#############################################################################################################################
UDP:
DNS ASK up####.360safe.com
DNS ASK st####.sipphone.com
DNS ASK tr.#.360.cn
DNS ASK ag#.#.360.cn
DNS ASK st.#.360.cn
DNS ASK pi###.360.cn
'22#.#81.126.81':80
'st.#.360.cn':3478
'st####.sipphone.com':3478
Miscellaneous:
Searches for the following windows:
ClassName: 'Shell_TrayWnd' WindowName: '(null)'
Scaricate Dr.Web per Android
Gratis per 3 mesi
Tutti i componenti di protezione
Rinnovo versione di prova tramite AppGallery/Google Pay
Continuando a utilizzare questo sito, l'utente acconsente al nostro utilizzo di file Cookie e di altre tecnologie per la raccolta di informazioni statistiche sui visitatori. Per maggiori informazioni
OK