Per il corretto funzionamento del sito, è necessario attivare il supporto di JavaScript nel browser.
Win32.HLLW.Autoruner2.16353
Aggiunto al database dei virus Dr.Web:
2014-07-23
La descrizione è stata aggiunta:
2014-07-23
Technical Information
To ensure autorun and distribution:
Creates or modifies the following files:
%HOMEPATH%\Start Menu\Programs\Startup\Internet.exe
Malicious functions:
Creates and executes the following:
'%TEMP%\ProgDVB7.06.1Pro.exe'
'%TEMP%\Internet.exe'
Executes the following:
'%WINDIR%\Microsoft.NET\Framework\v2.0.50727\csc.exe' /noconfig /fullpaths @"%TEMP%\qiusdw7o.cmdline"
'%WINDIR%\Microsoft.NET\Framework\v2.0.50727\cvtres.exe' /NOLOGO /READONLY /MACHINE:IX86 "/OUT:%TEMP%\RESA.tmp" "%TEMP%\CSC9.tmp"
'%WINDIR%\Microsoft.NET\Framework\v2.0.50727\csc.exe' /noconfig /fullpaths @"%TEMP%\_acjceq4.cmdline"
'%WINDIR%\Microsoft.NET\Framework\v2.0.50727\cvtres.exe' /NOLOGO /READONLY /MACHINE:IX86 "/OUT:%TEMP%\RES8.tmp" "%TEMP%\CSC7.tmp"
Modifies file system :
Creates the following files:
<LS_APPDATA>\IsolatedStorage\wdi3xij5.sfh\rae1vrwe.o1i\Url.d3shnotau42tcmwdxgkzyl0xms3ucy20\AssemFiles\F6F13A29\D\UGxhdGZvcm0gT1MgQml0bmVzczogMzI=.bin
<LS_APPDATA>\IsolatedStorage\wdi3xij5.sfh\rae1vrwe.o1i\Url.d3shnotau42tcmwdxgkzyl0xms3ucy20\AssemFiles\F6F13A29\D\UGxhdGZvcm0gQ3VsdHVyZSBOYW1lOiBlbi1VUw==.bin
%TEMP%\_acjceq4.cmdline
%TEMP%\_acjceq4.0.cs
<LS_APPDATA>\IsolatedStorage\wdi3xij5.sfh\rae1vrwe.o1i\Url.d3shnotau42tcmwdxgkzyl0xms3ucy20\AssemFiles\F6F13A29\D\UGxhdGZvcm0gQ1BVIENvcmVzOiAy.bin
<LS_APPDATA>\IsolatedStorage\wdi3xij5.sfh\rae1vrwe.o1i\Url.d3shnotau42tcmwdxgkzyl0xms3ucy20\AssemFiles\F6F13A29\Usages.bin
<LS_APPDATA>\IsolatedStorage\wdi3xij5.sfh\rae1vrwe.o1i\Url.d3shnotau42tcmwdxgkzyl0xms3ucy20\info.dat
<LS_APPDATA>\IsolatedStorage\wdi3xij5.sfh\rae1vrwe.o1i\Url.d3shnotau42tcmwdxgkzyl0xms3ucy20\AssemFiles\F6F13A29\D\UGxhdGZvcm06IFdpbmRvd3MgWFA=.bin
<LS_APPDATA>\IsolatedStorage\wdi3xij5.sfh\rae1vrwe.o1i\Url.d3shnotau42tcmwdxgkzyl0xms3ucy20\AssemFiles\F6F13A29\D\UGxhdGZvcm06IC5ORVQgNC4wIGluc3RhbGxlZA==.bin
%TEMP%\_acjceq4.out
%TEMP%\CSC9.tmp
%TEMP%\qiusdw7o.out
%TEMP%\qiusdw7o.dll
%TEMP%\RESA.tmp
%TEMP%\qiusdw7o.cmdline
%TEMP%\RES8.tmp
%TEMP%\CSC7.tmp
%TEMP%\qiusdw7o.0.cs
%TEMP%\_acjceq4.dll
<LS_APPDATA>\IsolatedStorage\wdi3xij5.sfh\rae1vrwe.o1i\Url.d3shnotau42tcmwdxgkzyl0xms3ucy20\identity.dat
%TEMP%\nsc5.tmp
%WINDIR%\Internet.exe
%TEMP%\nsc6.tmp\MultiUserConfig.ini
%TEMP%\nsc6.tmp\QuickModePage.ini
%TEMP%\aut3.tmp
%TEMP%\Internet.exe
%TEMP%\aut1.tmp
%TEMP%\ProgDVB7.06.1Pro.exe
%TEMP%\aut2.tmp
%TEMP%\nsc6.tmp\SourceTypeConfig.ini
%TEMP%\nsc6.tmp\nsSCM.dll
%TEMP%\nsc6.tmp\Processes.dll
%TEMP%\nsc6.tmp\InstallOptions.dll
%TEMP%\nsc6.tmp\System.dll
%TEMP%\nsc6.tmp\modern-wizard.bmp
%TEMP%\nsc6.tmp\Configuration.ini
%TEMP%\nsc6.tmp\InterfaceConfiguration.ini
%TEMP%\nsc6.tmp\ioSpecial.ini
%TEMP%\nsc6.tmp\components.ini
Deletes the following files:
%TEMP%\_acjceq4.dll
%TEMP%\_acjceq4.0.cs
%TEMP%\_acjceq4.out
%TEMP%\CSC9.tmp
%TEMP%\RESA.tmp
%TEMP%\_acjceq4.cmdline
%TEMP%\aut2.tmp
%TEMP%\aut1.tmp
%TEMP%\aut3.tmp
%TEMP%\CSC7.tmp
%TEMP%\RES8.tmp
Network activity:
Connects to:
'sa######vice.red-gate.com':80
'is.gd':80
'wp#d':80
TCP:
HTTP GET requests:
is.gd/M0Jbvl
wp#d/wpad.dat
UDP:
DNS ASK sa######vice.red-gate.com
DNS ASK is.gd
DNS ASK wp#d
Miscellaneous:
Searches for the following windows:
ClassName: 'Shell_TrayWnd' WindowName: '(null)'
Scaricate Dr.Web per Android
Gratis per 3 mesi
Tutti i componenti di protezione
Rinnovo versione di prova tramite AppGallery/Google Pay
Continuando a utilizzare questo sito, l'utente acconsente al nostro utilizzo di file Cookie e di altre tecnologie per la raccolta di informazioni statistiche sui visitatori. Per maggiori informazioni
OK