La mia libreria
La mia libreria

+ Aggiungi alla libreria

Supporto
Supporto 24/7 | Regole per contattare

Richieste

Profile

Win32.HLLM.Siggen.89

Aggiunto al database dei virus Dr.Web: 2013-11-14

La descrizione è stata aggiunta:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe,<SYSTEM32>\73322.exe'
Malicious functions:
Executes the following:
  • '<SYSTEM32>\ntvdm.exe' -f -i2
  • '<SYSTEM32>\ntvdm.exe' -f -i1
Modifies file system :
Creates the following files:
  • <SYSTEM32>\rmsx.exe
  • <SYSTEM32>\msx.dat
  • <SYSTEM32>\logonin.exe
  • <SYSTEM32>\newedi.ocx
  • %WINDIR%\Temp\scs1.tmp
  • %WINDIR%\Temp\scs4.tmp
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\watch[1]
  • %WINDIR%\Temp\scs2.tmp
  • %WINDIR%\Temp\scs3.tmp
  • <SYSTEM32>\netsturt.exe
  • <SYSTEM32>\msx.com
  • <SYSTEM32>\shotdawm.exe
  • <SYSTEM32>\73322.exe
  • <SYSTEM32>\smuu.exe
  • <SYSTEM32>\tackmen.exe
  • <SYSTEM32>\regservr.exe
  • <SYSTEM32>\conami.exe
  • <SYSTEM32>\tashutdm.exe
Deletes the following files:
  • %WINDIR%\Temp\scs4.tmp
  • %TEMP%\~DF1F0E.tmp
  • %WINDIR%\Temp\scs2.tmp
  • %WINDIR%\Temp\scs1.tmp
  • %WINDIR%\Temp\scs3.tmp
Network activity:
Connects to:
  • '74.##5.232.51':25
  • 'www.yo##ube.com':80
  • 'localhost':1035
TCP:
HTTP GET requests:
  • www.yo##ube.com/watch?v=###########
UDP:
  • DNS ASK gs####85.google.com
  • DNS ASK www.yo##ube.com
Miscellaneous:
Searches for the following windows:
  • ClassName: 'ConsoleWindowClass' WindowName: 'ntvdm-b58.b5c.390002'
  • ClassName: 'MS_AutodialMonitor' WindowName: '(null)'
  • ClassName: 'MS_WebcheckMonitor' WindowName: '(null)'
  • ClassName: 'ConsoleWindowClass' WindowName: 'ntvdm-b40.b44.380001'
  • ClassName: '' WindowName: '(null)'
  • ClassName: 'Shell_TrayWnd' WindowName: '(null)'
  • ClassName: 'IEFrame' WindowName: '(null)'