Win32.HLLW.Autoruner2.64516
Added to the Dr.Web virus database:
2019-10-08
Virus description added:
2019-10-09
Technical Information
To ensure autorun and distribution
Modifies the following registry keys
- [<HKCU>\software\microsoft\windows\currentversion\run] '<File name>' = 'wscript.exe //B "%APPDATA%\<File name>.vbs"'
- [<HKLM>\software\microsoft\windows\currentversion\run] '<File name>' = 'wscript.exe //B "%APPDATA%\<File name>.vbs"'
Creates or modifies the following files
- %APPDATA%\microsoft\windows\start menu\programs\startup\<File name>.vbs
Creates the following files on removable media
- <Drive name for removable media>:\<File name>.vbs
- <Drive name for removable media>:\proposaltemplates.lnk
- <Drive name for removable media>:\accountsreceivable.lnk
- <Drive name for removable media>:\ppswamp.lnk
- <Drive name for removable media>:\sim_gametheory_to_finance.lnk
- <Drive name for removable media>:\breakpoint.lnk
- <Drive name for removable media>:\block.lnk
- <Drive name for removable media>:\ck_ugo.lnk
- <Drive name for removable media>:\delongcacert.lnk
- <Drive name for removable media>:\ck.lnk
- <Drive name for removable media>:\samieee_obiee_presentation.lnk
- <Drive name for removable media>:\irgeek.lnk
- <Drive name for removable media>:\ff_ot_user_guide.lnk
- <Drive name for removable media>:\spib_pima.lnk
- <Drive name for removable media>:\video_1.lnk
- <Drive name for removable media>:\clip_480_5sec_6mbps_h264.lnk
- <Drive name for removable media>:\scan.lnk
- <Drive name for removable media>:\2.lnk
- <Drive name for removable media>:\4f0bf7ff71f28.lnk
- <Drive name for removable media>:\13.lnk
- <Drive name for removable media>:\region-north-karelia.lnk
- <Drive name for removable media>:\lom602.lnk
- <Drive name for removable media>:\hypothyroidism_slides.lnk
- <Drive name for removable media>:\middaugh_keynote.lnk
- <Drive name for removable media>:\skos.lnk
- <Drive name for removable media>:\fiche_inscription_2015.lnk
- <Drive name for removable media>:\applicant.lnk
- <Drive name for removable media>:\2013_finalsummaryforweb.lnk
- <Drive name for removable media>:\cee_mmsprogram_summary_public.lnk
- <Drive name for removable media>:\highly_cited_2001.lnk
- <Drive name for removable media>:\disclosuredetails.lnk
- <Drive name for removable media>:\al.lnk
- <Drive name for removable media>:\subjectclassification.lnk
- <Drive name for removable media>:\productos.lnk
- <Drive name for removable media>:\calculatorworksheet.lnk
- <Drive name for removable media>:\babyboymaintonotesbackground_pal.lnk
- <Drive name for removable media>:\babyboymaintoscenesbackground_pal.lnk
- <Drive name for removable media>:\flower_trans_matte.lnk
- <Drive name for removable media>:\waterlandhealthkano.lnk
- <Drive name for removable media>:\phytoremediation.lnk
- <Drive name for removable media>:\krsweden.lnk
- <Drive name for removable media>:\pubnet_855.lnk
- <Drive name for removable media>:\pandp.lnk
- <Drive name for removable media>:\swc_2009-03-02.lnk
- <Drive name for removable media>:\sioc.lnk
- <Drive name for removable media>:\foaf.lnk
- <Drive name for removable media>:\210252809.lnk
- <Drive name for removable media>:\price.lnk
- <Drive name for removable media>:\1189.lnk
- <Drive name for removable media>:\168.lnk
- <Drive name for removable media>:\weeklysheet1215.lnk
- <Drive name for removable media>:\fi51.lnk
- <Drive name for removable media>:\contoso.lnk
- <Drive name for removable media>:\pmd.lnk
- <Drive name for removable media>:\contoso_1.lnk
- <Drive name for removable media>:\sdkfailsafeemulator.lnk
- <Drive name for removable media>:\contosoroot.lnk
- <Drive name for removable media>:\contosoroot_1.lnk
- <Drive name for removable media>:\dashborder_192.lnk
- <Drive name for removable media>:\508softwareandos.lnk
- <Drive name for removable media>:\coffee.lnk
- <Drive name for removable media>:\dial.lnk
- <Drive name for removable media>:\dashborder_144.lnk
- <Drive name for removable media>:\dashborder_96.lnk
- <Drive name for removable media>:\dashborder_120.lnk
- <Drive name for removable media>:\delete.lnk
- <Drive name for removable media>:\join.lnk
- <Drive name for removable media>:\000814251_video_01.lnk
- <Drive name for removable media>:\split.lnk
- <Drive name for removable media>:\correct.lnk
- <Drive name for removable media>:\toolbar.lnk
- <Drive name for removable media>:\february_catalogue__2015.lnk
- <Drive name for removable media>:\holycrosschurchinstructions.lnk
- <Drive name for removable media>:\nwfieldnotes1966.lnk
- <Drive name for removable media>:\3.lnk
- <Drive name for removable media>:\pushkin.lnk
- <Drive name for removable media>:\api-hashmap.lnk
- <Drive name for removable media>:\howto-index.lnk
- <Drive name for removable media>:\about.lnk
- <Drive name for removable media>:\trivial-merge.lnk
- <Drive name for removable media>:\garden.lnk
- <Drive name for removable media>:\browse.lnk
- <Drive name for removable media>:\advice_process.lnk
- <Drive name for removable media>:\ituneshelpunavailable.lnk
- <Drive name for removable media>:\tree_view.lnk
- <Drive name for removable media>:\64bit_notes.lnk
- <Drive name for removable media>:\alert.lnk
- <Drive name for removable media>:\notepad.lnk
- <Drive name for removable media>:\skypesetup.lnk
- <Drive name for removable media>:\wrar520.lnk
- <Drive name for removable media>:\jre-7u75-windows-i586-iftw.lnk
- <Drive name for removable media>:\winmine.lnk
- <Drive name for removable media>:\hadac_newsletter_july_2010_final.lnk
- <Drive name for removable media>:\adhd_and_obesity.lnk
- <Drive name for removable media>:\sdszfo.lnk
- <Drive name for removable media>:\parnas_01.lnk
- <Drive name for removable media>:\1sm_price.lnk
Malicious functions
Creates and executes the following
- '%APPDATA%\_output4bd1940.exe'
Injects code into
the following user processes:
Modifies file system
Creates the following files
- %APPDATA%\<File name>.vbs
- %APPDATA%\_output4bd1940.exe
Sets the 'hidden' attribute to the following files
- <Drive name for removable media>:\<File name>.vbs
Miscellaneous
Creates and executes the following
- '<SYSTEM32>\wscript.exe' //B "%APPDATA%\<File name>.vbs"
欢迎下载
Dr.Web for Android
-
免费3个月
-
可使用所有保护组件
-
可在AppGallery/Google Pay延期
继续使用此网站意味着您同意我们使用Cookie文件和其他用于收集网站访问统计信息的技术手段。详细信息