Per il corretto funzionamento del sito, è necessario attivare il supporto di JavaScript nel browser.
Win32.HLLW.Autoruner1.52072
Aggiunto al database dei virus Dr.Web:
2013-07-23
La descrizione è stata aggiunta:
2013-07-25
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'ctfmon.exe' = 'C:\PROGRA~2\rundll32.exe C:\PROGRA~2\jmcoaf.dat,FG00'
Infects the following executable system files:
%WINDIR%\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll
Malicious functions:
Executes the following:
'<SYSTEM32>\taskhost.exe' $(Arg0)
'<SYSTEM32>\wermgr.exe' -queuereporting
'<SYSTEM32>\taskhost.exe'
'<SYSTEM32>\ctfmon.exe'
Modifies settings of Windows Internet Explorer:
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1] '2500' = '00000003'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0] '2500' = '00000003'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2] '2500' = '00000003'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4] '2500' = '00000003'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3] '2500' = '00000003'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1] '1609' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0] '1609' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2] '1609' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4] '1609' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3] '1609' = '00000000'
Modifies file system :
Creates the following files:
<LS_APPDATA>\Microsoft\Media Player\Art Cache\LocalMLS\{882E5844-4F08-485B-A913-CCAD8F180AEC}.jpg
<LS_APPDATA>\Microsoft\Media Player\Art Cache\LocalMLS\{44C6560E-E799-455A-98BE-3866FF915916}.jpg
C:\Users\Public\Music\Sample Music\AlbumArt_{5FA05D35-A682-4AF6-96F7-0773E42D4D16}_Small.jpg
C:\Users\Public\Music\Sample Music\Folder.jpg
C:\Users\Public\Music\Sample Music\AlbumArt_{5FA05D35-A682-4AF6-96F7-0773E42D4D16}_Large.jpg
<LS_APPDATA>\Microsoft\Windows\Temporary Internet Files\Content.IE5\BOWDBRP7\getmdrcdbackground[1]
C:\ProgramData\Microsoft\RAC\Temp\sqlC6A8.tmp
C:\ProgramData\Microsoft\RAC\Temp\sqlC6C8.tmp
<LS_APPDATA>\Microsoft\Windows\Temporary Internet Files\Content.IE5\YF7T7AK2\IE9CompatViewList[1].xml
<LS_APPDATA>\Microsoft\Windows\Temporary Internet Files\Content.IE5\SOXZEUJX\getmdrcdposturlbackground[1]
<LS_APPDATA>\Microsoft\Windows\Temporary Internet Files\Content.IE5\6P5SDOMI\getmdrcdposturlbackground[1]
C:\ProgramData\faocmj.pad
C:\ProgramData\faocmj.js
C:\ProgramData\rundll32.exe
C:\ProgramData\jmcoaf.dat
C:\ProgramData\Microsoft\RAC\Temp\sql8536.tmp
<LS_APPDATA>\Microsoft\Windows\Temporary Internet Files\Content.IE5\YF7T7AK2\allservices[1]
C:\Users\Public\Music\Sample Music\AlbumArtSmall.jpg
<LS_APPDATA>\Microsoft\Windows\Temporary Internet Files\Content.IE5\6P5SDOMI\fwlink[1]
C:\ProgramData\Microsoft\RAC\Temp\sql8516.tmp
%APPDATA%\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\msconfig.lnk
Sets the 'hidden' attribute to the following files:
C:\Users\Public\Music\Sample Music\AlbumArt_{5FA05D35-A682-4AF6-96F7-0773E42D4D16}_Small.jpg
<LS_APPDATA>\Microsoft\Media Player\Art Cache\LocalMLS\{882E5844-4F08-485B-A913-CCAD8F180AEC}.jpg
<LS_APPDATA>\Microsoft\Media Player\Art Cache\LocalMLS\{44C6560E-E799-455A-98BE-3866FF915916}.jpg
C:\Users\Public\Music\Sample Music\AlbumArtSmall.jpg
C:\Users\Public\Music\Sample Music\Folder.jpg
C:\Users\Public\Music\Sample Music\AlbumArt_{5FA05D35-A682-4AF6-96F7-0773E42D4D16}_Large.jpg
Deletes the following files:
C:\ProgramData\Microsoft\RAC\Temp\sql8516.tmp
C:\ProgramData\Microsoft\RAC\Temp\sql8536.tmp
Network activity:
Connects to:
'66.##7.215.165':443
'localhost':51670
'wh###illber.com':443
'localhost':54473
'66.##7.217.85':443
'localhost':58919
'66.##7.217.85':80
'20#.#6.232.182':443
'20#.#6.232.182':80
TCP:
HTTP GET requests:
20#.#6.232.182/redir/getmdrcdposturlbackground/?lo#######################################################################################################
20#.#6.232.182/IE9CompatViewList.xml
20#.#6.232.182/redir/getmdrcdbackground/?lo##################################################################################################
20#.#6.232.182/fwlink/?Li##########
20#.#6.232.182/redir/allservices/?sv#############################################################
UDP:
DNS ASK ie######t.ie.microsoft.com
DNS ASK wh###illber.com
DNS ASK dn#.##ftncsi.com
DNS ASK re###.####services.microsoft.com
DNS ASK go.###rosoft.com
DNS ASK ur#.##crosoft.com
'23#.#55.255.250':1900
Miscellaneous:
Searches for the following windows:
ClassName: 'MS_WebCheckMonitor' WindowName: '(null)'
ClassName: '' WindowName: '(null)'
ClassName: 'Type32_Main_Window' WindowName: '(null)'
ClassName: 'Indicator' WindowName: '(null)'
ClassName: 'Shell_TrayWnd' WindowName: '(null)'
ClassName: 'MS_AutodialMonitor' WindowName: '(null)'
Scaricate Dr.Web per Android
Gratis per 3 mesi
Tutti i componenti di protezione
Rinnovo versione di prova tramite AppGallery/Google Pay
Continuando a utilizzare questo sito, l'utente acconsente al nostro utilizzo di file Cookie e di altre tecnologie per la raccolta di informazioni statistiche sui visitatori. Per maggiori informazioni
OK