To bypass firewall, removes or modifies the following registry keys:
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '<Full path to virus>' = '<Full path to virus>:*:Enabled:<Virus name>'
Creates and executes the following:
- C:\1.exe
- C:\1.exe (downloaded from the Internet)
Searches for registry branches where third party applications store passwords:
- [<HKLM>\Software\Ghisler\Windows Commander]
- [<HKCU>\Software\Ghisler\Total Commander]
- [<HKCU>\SOFTWARE\Far\Plugins\FTP\Hosts]
- [<HKLM>\Software\Ghisler\Total Commander]
- [<HKLM>\SOFTWARE\Miranda]
- [<HKCU>\SOFTWARE\Mirabilis\ICQ\NewOwners]
- [<HKCU>\Software\Ghisler\Windows Commander]
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Trillian]
Hooks the following functions in System Service Descriptor Table (SSDT):
- NtQuerySystemInformation, handler: syswrk.sys
Hides the following processes:
Sets a new unauthorized home page for Windows Internet Explorer.