Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Win32.HLLW.Autoruner.46857

Added to the Dr.Web virus database: 2011-03-08

Virus description added:

Technical Information

To ensure autorun and distribution
Modifies the following registry keys
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Windows Defence' = '%APPDATA%\Microsoft\Security\WinDef'
Creates the following files on removable media
  • <Drive name for removable media>:\svchosted.exe
  • <Drive name for removable media>:\autorun.inf
Malicious functions
Injects code into
the following system processes:
  • %WINDIR%\microsoft.net\framework\v2.0.50727\vbc.exe
Modifies file system
Creates the following files
  • %APPDATA%\microsoft\security\windef
  • %APPDATA%\lovely.ini
  • %APPDATA%\.exe
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\content.ie5\caasbycl\dnserrordiagoff_weboc[1]
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\content.ie5\re1n75kr\errorpagetemplate[1]
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\content.ie5\0u8lpyu9\errorpagestrings[1]
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\content.ie5\caasbycl\httperrorpagesscripts[1]
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\content.ie5\bzjx5bke\background_gradient[2]
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\content.ie5\bzjx5bke\info_48[1]
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\content.ie5\0u8lpyu9\bullet[1]
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\content.ie5\caasbycl\down[1]
Sets the 'hidden' attribute to the following files
  • <Drive name for removable media>:\svchosted.exe
  • <Drive name for removable media>:\autorun.inf
Miscellaneous
Searches for the following windows
  • ClassName: 'MS_AutodialMonitor' WindowName: ''
  • ClassName: 'MS_WebCheckMonitor' WindowName: ''
Executes the following
  • '%WINDIR%\microsoft.net\framework\v2.0.50727\vbc.exe'