Поддержка
Круглосуточная поддержка

Позвоните

Бесплатно по России:
8-800-333-79-32

ЧаВо | Форум

Ваши запросы

  • Все: -
  • Незакрытые: -
  • Последний: -

Позвоните

Бесплатно по России:
8-800-333-79-32

Свяжитесь с нами Незакрытые запросы: 

Профиль

Профиль

Win32.IRC.Bot.693

Добавлен в вирусную базу Dr.Web: 2025-03-29

Описание добавлено:

Technical Information

To ensure autorun and distribution
Modifies the following registry keys
  • [HKLM\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run] 'Windows logon service' = '%WINDIR%\SysWOW64\setup\winlogons.exe'
  • [HKCU\Software\Microsoft\Windows\CurrentVersion\Run] 'Windows logon service' = '%WINDIR%\SysWOW64\setup\winlogons.exe'
  • [HKLM\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices] 'Windows logon service' = '%WINDIR%\SysWOW64\setup\winlogons.exe'
  • [HKCU\Software\Microsoft\Windows\CurrentVersion\RunServices] 'Windows logon service' = '%WINDIR%\SysWOW64\setup\winlogons.exe'
Malicious functions
To complicate detection of its presence in the operating system,
forces the system hide from view:
  • hidden files
Modifies file system
Creates the following files
  • %WINDIR%\syswow64\setup\winlogons.exe
  • %WINDIR%\syswow64\setup\desktop.sys
  • %WINDIR%\syswow64\setup\explorer.sys
  • %WINDIR%\syswow64\setup\user32.dll
  • %WINDIR%\syswow64\setup\gdi32.dll
  • %WINDIR%\syswow64\setup\win.ini
Sets the 'hidden' attribute to the following files
  • %WINDIR%\syswow64\setup\winlogons.exe
Network activity
Connects to
  • '255.255.255.255':81
UDP
  • DNS ASK cr###r0x.net
Miscellaneous
Searches for the following windows
  • ClassName: 'HijackThis' WindowName: ''
  • ClassName: 'TAAWCore' WindowName: ''
  • ClassName: '' WindowName: 'Microsoft AntiSpyware AutoUpdater'
  • ClassName: '' WindowName: 'Microsoft AntiSpyware (Beta 1)'
  • ClassName: 'ThunderRT6FormDC' WindowName: 'gcasDtServHolder'
  • ClassName: 'Sym_ccWebWindow_Class' WindowName: 'Norton AntiVirus'
  • ClassName: '' WindowName: 'AVG Anti-Virus 7.1'
  • ClassName: '' WindowName: 'AnalogX PacketMon (www.analogx.com)'
  • ClassName: 'IrisWnd' WindowName: ''
  • ClassName: '' WindowName: 'CommView'
  • ClassName: '' WindowName: 'EtherDetect'
  • ClassName: '' WindowName: 'Sniffem'
  • ClassName: 'LF-MAIN' WindowName: ''
  • ClassName: '' WindowName: 'Sniphere v2.0'
  • ClassName: '' WindowName: 'Registry Editor'
  • ClassName: 'SandboxieControlWndClass' WindowName: ''
Creates and executes the following
  • '%WINDIR%\syswow64\setup\winlogons.exe' /del <Full path to file>
Executes the following
  • '%WINDIR%\syswow64\setup\winlogons.exe' /del <Full path to file>' (with hidden window)