La mia libreria
La mia libreria

+ Aggiungi alla libreria

Supporto
Supporto 24/7 | Regole per contattare

Richieste

Profile

Win32.HLLO.Blop.156

Aggiunto al database dei virus Dr.Web: 2012-08-07

La descrizione è stata aggiunta:

Technical Information

To ensure autorun and distribution:
Creates or modifies the following files:
  • %ALLUSERSPROFILE%\Start Menu\Programs\Startup\js.exe.pif
  • %ALLUSERSPROFILE%\Start Menu\Programs\Startup\xpt_dump.exe.pif
  • %ALLUSERSPROFILE%\Start Menu\Programs\Startup\xpcshell.exe.pif
Creates the following services:
  • [<HKLM>\SYSTEM\ControlSet001\Services\ESFY6ZV] 'Start' = '00000002'
Malicious functions:
Creates and executes the following:
  • %PROGRAM_FILES%\TNM9A4M1HEBZ.exe rb
  • %PROGRAM_FILES%\TNM9A4M1HEBZ.exe <Full path to virus>
Executes the following:
  • <SYSTEM32>\reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Display Inline Videos" /t REG_SZ /d no /F
  • <SYSTEM32>\reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v Play_Animations /t REG_SZ /d no /F
  • <SYSTEM32>\reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v Play_Background_Sounds /t REG_SZ /d no /F
  • <SYSTEM32>\reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Display Inline Images" /t REG_SZ /d yes /F
  • <SYSTEM32>\reg.exe delete HKLM\Software\Microsoft\Windows\CurrentVersion\Run /F
  • <SYSTEM32>\reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Disable Script Debugger" /t REG_SZ /d yes /F
  • <SYSTEM32>\reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v DisableScriptDebuggerIE /t REG_SZ /d yes /F
  • <SYSTEM32>\regsvr32.exe /u /s shimgvw.dll
  • <SYSTEM32>\sc.exe create KZ2ZZCT5G5YBinPath= "%PROGRAM_FILES%\HCOSOJ\II5F1R1.exe -start" type= own type= interact start= auto DisplayName= DRT95
  • <SYSTEM32>\cmd.exe /c "%PROGRAM_FILES%\61Y64RDE85V.bat"
  • <SYSTEM32>\regsvr32.exe /u /s itss.dll
  • <SYSTEM32>\regsvr32.exe /s jscript.dll
  • <SYSTEM32>\regsvr32.exe /u /s vbscript.dll
  • <SYSTEM32>\regsvr32.exe /u /s scrrun.dll
Modifies file system :
Creates the following files:
  • %PROGRAM_FILES%\HCOSOJ\II5F1R1.exe.com
  • %PROGRAM_FILES%\FireFox\xpt_link.exe.com
  • %PROGRAM_FILES%\Internet Explorer\iedw.exe.com
  • %PROGRAM_FILES%\Internet Explorer\Connection Wizard\icwconn1.exe.com
  • %PROGRAM_FILES%\FireFox\xpcshell.exe.com
  • %PROGRAM_FILES%\FireFox\updater.exe.com
  • %PROGRAM_FILES%\FireFox\xpt_dump.exe.com
  • %PROGRAM_FILES%\FireFox\xpidl.exe.com
  • %PROGRAM_FILES%\NetMeeting\cb32.exe.com
  • %PROGRAM_FILES%\MSN Gaming Zone\Windows\bckgzm.exe.com
  • %PROGRAM_FILES%\TNM9A4M1HEBZ.exe.com
  • %PROGRAM_FILES%\Outlook Express\msimn.exe.com
  • %PROGRAM_FILES%\Movie Maker\moviemk.exe.com
  • %PROGRAM_FILES%\Messenger\msmsgs.exe.com
  • %PROGRAM_FILES%\MSN\MSNCoreFiles\Install\msnsusii.exe.com
  • %PROGRAM_FILES%\MSN\MSNCoreFiles\Install\MSN9Components\Digcore.exe.com
  • %PROGRAM_FILES%\FireFox\uninstall\helper.exe.com
  • %CommonProgramFiles%\Microsoft Shared\DW\DWTRIG20.EXE.com
  • %CommonProgramFiles%\Microsoft Shared\DW\DW20.EXE.com
  • %CommonProgramFiles%\Microsoft Shared\Speech\sapisvr.exe.com
  • %CommonProgramFiles%\Microsoft Shared\MSInfo\msinfo32.exe.com
  • %PROGRAM_FILES%\HCOSOJ\II5F1R1.exe
  • %PROGRAM_FILES%\TNM9A4M1HEBZ.exe
  • %WINDIR%\8RM49NQ3LZI.exe
  • %PROGRAM_FILES%\61Y64RDE85V.bat
  • %PROGRAM_FILES%\FireFox\plugin-container.exe.com
  • %PROGRAM_FILES%\FireFox\nsinstall.exe.com
  • %PROGRAM_FILES%\FireFox\shlibsign.exe.com
  • %TEMP%\RGI1.tmp
  • %PROGRAM_FILES%\FireFox\firefox.exe.com
  • %PROGRAM_FILES%\FireFox\crashreporter.exe.com
  • %PROGRAM_FILES%\FireFox\mangle.exe.com
  • %PROGRAM_FILES%\FireFox\js.exe.com
Sets the 'hidden' attribute to the following files:
  • <Full path to virus>
Deletes the following files:
  • %WINDIR%\Media\Windows XP Logon Sound.wav
  • %WINDIR%\Media\Windows XP Logoff Sound.wav
  • %WINDIR%\Media\Windows XP Minimize.wav
  • %WINDIR%\Media\Windows XP Menu Command.wav
  • %WINDIR%\Media\Windows XP Information Bar.wav
  • %WINDIR%\Media\Windows XP Hardware Fail.wav
  • %WINDIR%\Media\Windows XP Exclamation.wav
  • %WINDIR%\Media\Windows XP Hardware Remove.wav
  • %WINDIR%\Media\Windows XP Hardware Insert.wav
  • %WINDIR%\Media\Windows XP Notify.wav
  • %WINDIR%\Media\Windows XP Shutdown.wav
  • %WINDIR%\Media\Windows XP Ringout.wav
  • %WINDIR%\Media\Windows XP Startup.wav
  • %WINDIR%\Media\Windows XP Start.wav
  • %WINDIR%\Media\Windows XP Ringin.wav
  • %WINDIR%\Media\Windows XP Print complete.wav
  • %WINDIR%\Media\Windows XP Pop-up Blocked.wav
  • %WINDIR%\Media\Windows XP Restore.wav
  • %WINDIR%\Media\Windows XP Recycle.wav
  • %WINDIR%\Media\Windows XP Error.wav
  • %WINDIR%\Media\onestop.mid
  • %WINDIR%\Media\notify.wav
  • %WINDIR%\Media\ringin.wav
  • %WINDIR%\Media\recycle.wav
  • %WINDIR%\Media\flourish.mid
  • %WINDIR%\Media\chimes.wav
  • %TEMP%\RGI1.tmp
  • %WINDIR%\Media\ding.wav
  • %WINDIR%\Media\chord.wav
  • %WINDIR%\Media\ringout.wav
  • %WINDIR%\Media\Windows XP Critical Stop.wav
  • %WINDIR%\Media\Windows XP Battery Low.wav
  • %WINDIR%\Media\Windows XP Ding.wav
  • %WINDIR%\Media\Windows XP Default.wav
  • %WINDIR%\Media\Windows XP Battery Critical.wav
  • %WINDIR%\Media\tada.wav
  • %WINDIR%\Media\start.wav
  • %WINDIR%\Media\Windows XP Balloon.wav
  • %WINDIR%\Media\town.mid
Network activity:
Connects to:
  • '58.#9.58.27':443
Miscellaneous:
Searches for the following windows:
  • ClassName: 'Shell_TrayWnd' WindowName: ''
  • ClassName: 'TUDVYCSEQCBLLV' WindowName: 'fqjdkleozbrolw'