Bibliothèque
Ma bibliothèque

+ Ajouter à la bibliothèque

Contacter-nous !
Support 24/24 | Rules regarding submitting

Nous téléphoner

0 825 300 230

Forum

Vos requêtes

  • Toutes : -
  • Non clôturées : -
  • Dernière : le -

Nous téléphoner

0 825 300 230

Profil

Win32.HLLW.Autoruner1.35867

Added to the Dr.Web virus database: 2013-04-28

Virus description added:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'winlogon' = 'C:\Config\system.exe'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run] 'winlogon' = 'C:\Config\system.exe'
Creates the following files on removable media:
  • <Drive name for removable media>:\autorun.inf
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
  • hidden files
Creates and executes the following:
  • 'C:\Config\sys.exe'
  • 'C:\Config\system.exe'
  • '%TEMP%\RarSFX0\first.exe'
Modifies file system :
Creates the following files:
  • C:\Config\system.exe
  • %TEMP%\RarSFX0\system.exe
  • C:\Config\child\autorun.inf
  • C:\Config\sys.exe
  • %TEMP%\RarSFX0\child\autorun.inf
  • %TEMP%\RarSFX0\drivelist.txt
  • %TEMP%\RarSFX0\sys.exe
  • %TEMP%\RarSFX0\first.exe
Sets the 'hidden' attribute to the following files:
  • C:\Config\sys.exe
  • C:\Config\system.exe
  • %TEMP%\RarSFX0\child\autorun.inf
  • C:\Config\child\autorun.inf
Deletes the following files:
  • %TEMP%\RarSFX0\system.exe
  • %TEMP%\RarSFX0\child\autorun.inf
  • %TEMP%\RarSFX0\sys.exe
  • %TEMP%\RarSFX0\drivelist.txt
  • %TEMP%\RarSFX0\first.exe
Miscellaneous:
Searches for the following windows:
  • ClassName: 'AutoHotkey' WindowName: 'C:\Config\sys.exe'
  • ClassName: '#32771' WindowName: ''
  • ClassName: 'Indicator' WindowName: ''
  • ClassName: 'AutoHotkey' WindowName: 'C:\Config\system.exe'
  • ClassName: 'EDIT' WindowName: ''
  • ClassName: 'Shell_TrayWnd' WindowName: ''
  • ClassName: 'AutoHotkey' WindowName: '%TEMP%\RarSFX0\first.exe'