JavaScript support is required for our site to be fully operational in your browser.
Win32.HLLM.Limar.4499
Added to the Dr.Web virus database:
2013-07-25
Virus description added:
2013-07-25
Technical Information
Malicious functions:
Hooks the following functions in System Service Descriptor Table (SSDT):
NtQuerySystemInformation, handler: ndishook.sys
Modifies file system :
Creates the following files:
<DRIVERS>\ndishook.sys
%TEMP%\stoplist.dat
%TEMP%\gamelist.dat
Deletes the following files:
%TEMP%\stoplist.dat
%TEMP%\gamelist.dat
Network activity:
Connects to:
'wa####.365doc.info':6000
'wa####.pk2012.info':6000
'wa####.pcdogs.info':6000
'12#.#25.114.144':80
'ga##.#cdogs.info':6000
'11#.#8.65.113':6000
UDP:
DNS ASK wa####.365doc.info
DNS ASK wa####.pk2012.info
DNS ASK wa####.pcdogs.info
DNS ASK www.ba##u.com
DNS ASK ga##.#cdogs.info
'25#.#55.255.255':2012
Miscellaneous:
Searches for the following windows:
ClassName: '360se_Frame' WindowName: '(null)'
ClassName: 'SE_SogouExplorerFrame' WindowName: '(null)'
ClassName: 'Shell_TrayWnd' WindowName: '(null)'
ClassName: 'IEFrame' WindowName: '(null)'
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more
OK