JavaScript support is required for our site to be fully operational in your browser.
Win32.HLLW.Autoruner1.36947
Added to the Dr.Web virus database:
2013-05-13
Virus description added:
2013-05-14
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Yahoo Messengger' = '<SYSTEM32>\winfiles.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Shell' = 'Explorer.exe winfiles.exe'
Creates or modifies the following files:
Creates the following files on removable media:
<Drive name for removable media>:\autorun.inf
<Drive name for removable media>:\winfiles.exe
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
hidden files
file extensions
blocks execution of the following system utilities:
Windows Task Manager (Taskmgr)
Registry Editor (RegEdit)
blocks the following features:
Creates and executes the following:
'%WINDIR%\crack.exe'
'%WINDIR%\winnt.exe'
'%WINDIR%\crack.exe' (downloaded from the Internet)
Executes the following:
'<SYSTEM32>\at.exe' 09:00 /interactive /EVERY:m,t,w,th,f,s,su <SYSTEM32>\winfiles.exe
'<SYSTEM32>\at.exe' /delete /yes
Injects code into
the following system processes:
Modifies settings of Windows Internet Explorer:
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3] 'RecommendedLevel' = '00011000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3] 'MinLevel' = '00011000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3] 'Flags' = '00000001'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4] '' = ''
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3] '1805' = '00000001'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3] '' = ''
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2] '1805' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3] 'DisplayName' = 'Internet'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3] 'Icon' = 'inetcpl.cpl#001313'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3] 'Description' = 'This zone contains all Web sites you haven't placed in other zones'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1] 'CurrentLevel' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4] 'Flags' = '00000003'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2] 'CurrentLevel' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4] 'CurrentLevel' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3] 'CurrentLevel' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4] 'Description' = 'This zone contains Web sites that could potentially damage your computer or data.'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4] 'DisplayName' = 'Restricted sites'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4] 'Icon' = 'inetcpl.cpl#00004481'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4] 'RecommendedLevel' = '00012000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4] 'MinLevel' = '00012000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2] 'Flags' = '00000047'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0] '1805' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0] 'Flags' = '00000021'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1] '' = ''
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1] 'Description' = 'This zone contains all Web sites that are on your organization's intranet.'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1] 'DisplayName' = 'Local intranet'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0] 'DisplayName' = 'My Computer'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0] '' = ''
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0] 'Description' = 'Your computer'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0] 'CurrentLevel' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0] 'Icon' = 'explorer.exe#0100'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2] 'Description' = 'This zone contains Web sites that you trust not to damage your computer or data.'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2] 'DisplayName' = 'Trusted sites'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2] 'Icon' = 'inetcpl.cpl#00004480'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2] 'RecommendedLevel' = '00010000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2] 'MinLevel' = '00010000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1] 'MinLevel' = '00010000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1] 'Icon' = 'shell32.dll#0018'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1] 'RecommendedLevel' = '00010500'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2] '' = ''
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1] '1805' = '00000000'
Forces autoplay for removable media.
Modifies file system :
Creates the following files:
%TEMP%\45754.dmp
%TEMP%\44283.dmp
%TEMP%\42FA7.dmp
%TEMP%\4A1AB.dmp
%TEMP%\478B6.dmp
%TEMP%\464F0.dmp
%TEMP%\41FAA.dmp
%TEMP%\3DD90.dmp
%TEMP%\3CD15.dmp
%TEMP%\3BBA0.dmp
%TEMP%\40DB8.dmp
%TEMP%\3FCB0.dmp
%TEMP%\3EED6.dmp
%TEMP%\53CE1.dmp
%TEMP%\5305E.dmp
%TEMP%\52504.dmp
%TEMP%\572D6.dmp
%TEMP%\55C12.dmp
%TEMP%\54C04.dmp
%TEMP%\50382.dmp
%TEMP%\RGI5.tmp
%TEMP%\RGI4.tmp
%TEMP%\RGI3.tmp
%TEMP%\4FD96.dmp
%TEMP%\RGI6.tmp
%TEMP%\3AA1C.dmp
%WINDIR%\crack.exe
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\Ass[1].exe
%TEMP%\294B4.dmp
%TEMP%\2E1AB.dmp
%TEMP%\2D98D.dmp
<SYSTEM32>\autorun.ini
%TEMP%\dw.log
<SYSTEM32>\winfiles.exe
%TEMP%\rmvxgaz
%TEMP%\aut1.tmp
%WINDIR%\winnt.exe
%TEMP%\aut2.tmp
%WINDIR%\winfiles.exe
%TEMP%\36BCB.dmp
%TEMP%\35DD1.dmp
%TEMP%\35610.dmp
%TEMP%\39A7C.dmp
%TEMP%\38BC6.dmp
%TEMP%\38241.dmp
%TEMP%\33F5C.dmp
%TEMP%\30205.dmp
%TEMP%\2F9C7.dmp
%TEMP%\2EAE3.dmp
%TEMP%\33895.dmp
%TEMP%\32413.dmp
%TEMP%\3134A.dmp
Sets the 'hidden' attribute to the following files:
<SYSTEM32>\autorun.ini
<Drive name for removable media>:\autorun.inf
<SYSTEM32>\winfiles.exe
%WINDIR%\winfiles.exe
Deletes the following files:
%TEMP%\RGI4.tmp
%TEMP%\RGI3.tmp
%TEMP%\RGI5.tmp
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\Ass[1].exe
%TEMP%\RGI6.tmp
%TEMP%\rmvxgaz
%TEMP%\aut1.tmp
%TEMP%\aut2.tmp
<Drive name for removable media>:\autorun.inf
<Drive name for removable media>:\winfiles.exe
Network activity:
Connects to:
TCP:
HTTP GET requests:
www.fr###ebtown.com/badino2/Ass.exe
UDP:
DNS ASK www.fr###ebtown.com
Miscellaneous:
Searches for the following windows:
ClassName: 'Shell_TrayWnd' WindowName: ''
ClassName: 'Indicator' WindowName: ''
欢迎下载 Dr.Web for Android
免费3个月
可使用所有保护组件
可在AppGallery/Google Pay延期
继续使用此网站意味着您同意我们使用Cookie文件和其他用于收集网站访问统计信息的技术手段。详细信息
OK