Win32.HLLW.Autoruner.55007
Added to the Dr.Web virus database:
2011-07-24
Virus description added:
2011-07-25
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'user-4bb09a9c02' = 'C:\Far\Plugins\calc2\diantz.exe'
- [<HKCU>\Software\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Shell' = 'explorer.exe,"C:\Documents and Settings\Default User\Start Menu\Programs\Accessories\Entertainment\c_28597.exe"'
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe,C:\PROGRA~1\MICROS~1.NET\dpvvox.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'System' = 'C:\Far\Plugins\renamer1\dmserver.exe'
- [<HKCU>\Software\Microsoft\Windows NT\CurrentVersion\Windows] 'run' = '"%HOMEPATH%\Start Menu\Programs\cnvfat.com"'
- [<HKCU>\Software\Microsoft\Windows NT\CurrentVersion\Windows] 'load' = '"<LS_APPDATA>\Mozilla\Firefox\Profiles\PRZHLN~1.DEF\Cache\3\86\cmmgr32.pif"'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] '%USERNAME%' = 'win.com "C:\Documents and Settings\Default User\MYDOCU~1\c_10079.nls"'
- [<HKCU>\Software\Microsoft\Windows NT\CurrentVersion\Winlogon] 'System' = '"%ALLUSERSPROFILE%\Application Data\<Auxiliary name>\Compatibility\native\cryptdlg.exe"'
Creates the following services:
- [<HKLM>\SYSTEM\ControlSet001\Services\MsNet] 'ImagePath' = '"C:\Documents and Settings\NetworkService\APPLIC~1\MICROS~1\INTERN~1\c_950.exe"'
- [<HKLM>\SYSTEM\ControlSet001\Services\MsNet] 'Start' = '00000002'
Creates the following files on removable media:
- <Drive name for removable media>:\autorun.inf
- <Drive name for removable media>:\bootvrfy.exe
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
Modifies file system :
Creates the following files:
- C:\Far\Plugins\renamer1\dmserver.exe
- %PROGRAM_FILES%\Microsoft.NET\dpvvox.exe
- C:\Far\Addons\Tables\Cyrillic\ddrawex.com
- C:\Far\Plugins\calc2\diantz.exe
- %CommonProgramFiles%\Microsoft Shared\VGX\dvdupgrd.cmd
- <Current directory>.exe
- <Current directory>\af32d3b0.exe
- C:\bootvid.dll
- C:\autorun.inf
- %APPDATA%\Mozilla\Firefox\Profiles\przhlnon.default\chrome\cdmodem.bat
- <LS_APPDATA>\Mozilla\Firefox\Profiles\przhlnon.default\OfflineCache\cipher.exe
- %HOMEPATH%\Recent\bios4.exe
- %APPDATA%\Microsoft\Windows\bthprops.exe
- <LS_APPDATA>\Mozilla\Firefox\Profiles\przhlnon.default\Cache\3\86\cmmgr32.pif
- C:\Documents and Settings\Default User\Start Menu\Programs\Accessories\Entertainment\c_28597.exe
- C:\Documents and Settings\NetworkService\Application Data\Microsoft\Internet Explorer\c_950.exe
- %HOMEPATH%\Start Menu\Programs\cnvfat.com
- %ALLUSERSPROFILE%\Application Data\<Auxiliary name>\Compatibility\native\cryptdlg.exe
Sets the 'hidden' attribute to the following files:
- %PROGRAM_FILES%\Microsoft.NET\dpvvox.exe
- %CommonProgramFiles%\Microsoft Shared\VGX\dvdupgrd.cmd
- C:\Far\Plugins\calc2\diantz.exe
- C:\Far\Plugins\renamer1\dmserver.exe
- <Drive name for removable media>:\bootvrfy.exe
- <Drive name for removable media>:\autorun.inf
- C:\bootvid.dll
- C:\autorun.inf
- C:\Far\Addons\Tables\Cyrillic\ddrawex.com
- %APPDATA%\Mozilla\Firefox\Profiles\przhlnon.default\chrome\cdmodem.bat
- <LS_APPDATA>\Mozilla\Firefox\Profiles\przhlnon.default\OfflineCache\cipher.exe
- %HOMEPATH%\Recent\bios4.exe
- %APPDATA%\Microsoft\Windows\bthprops.exe
- %ALLUSERSPROFILE%\Application Data\<Auxiliary name>\Compatibility\native\cryptdlg.exe
- C:\Documents and Settings\Default User\Start Menu\Programs\Accessories\Entertainment\c_28597.exe
- <LS_APPDATA>\Mozilla\Firefox\Profiles\przhlnon.default\Cache\3\86\cmmgr32.pif
- %HOMEPATH%\Start Menu\Programs\cnvfat.com
Miscellaneous:
Searches for the following windows:
- ClassName: 'Indicator' WindowName: ''
欢迎下载
Dr.Web for Android
-
免费3个月
-
可使用所有保护组件
-
可在AppGallery/Google Pay延期
继续使用此网站意味着您同意我们使用Cookie文件和其他用于收集网站访问统计信息的技术手段。详细信息