La mia libreria
La mia libreria

+ Aggiungi alla libreria

Supporto
Supporto 24/7 | Regole per contattare

Richieste

Profile

Win32.HLLW.Rubbish.260

Aggiunto al database dei virus Dr.Web: 2012-10-08

La descrizione è stata aggiunta:

Technical Information

Malicious functions:
Executes the following:
  • <SYSTEM32>\ipconfig.exe /all
Injects code into
the following system processes:
  • %WINDIR%\Explorer.EXE
Hooks the following functions in System Service Descriptor Table (SSDT):
  • NtQuerySystemInformation, handler: PCIDump.SYS
Modifies file system :
Creates the following files:
  • %WINDIR%\Temptemp.txt
  • %WINDIR%\Temp\000000000001.tmp
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\install[1].asp
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\index[1].txt
  • <DRIVERS>\pcidump.txt
  • %WINDIR%\Temp\mmhtml.dll
  • C:\kpp.log
Sets the 'hidden' attribute to the following files:
  • %WINDIR%\Temp\mmhtml.dll
Deletes the following files:
  • %WINDIR%\Temptemp.txt
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\install[1].asp
  • <DRIVERS>\pcidump.sys
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\index[1].txt
Moves the following files:
  • from <DRIVERS>\pcidump.txt to <DRIVERS>\pcidump.sys
Network activity:
Connects to:
  • 'www.xh##y.cn':80
  • 'ma.##pask.cn':80
  • 'localhost':1037
TCP:
HTTP GET requests:
  • www.xh##y.cn/install.asp
  • ma.##pask.cn/index.txt
UDP:
  • DNS ASK www.xh##y.cn
  • DNS ASK ma.##pask.cn