Para el funcionamiento correcto del sitio web, debe activar el soporte de JavaScript en su navegador.
Win32.HLLW.Autoruner.56180
Added to the Dr.Web virus database:
2011-08-13
Virus description added:
2011-08-13
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
[<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] '"%TEMP%\7~EV^7.eXe"' = '"%TEMP%\7~EV^7.eXe"'
[<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] '<Full path to virus>' = '<Full path to virus>'
Creates or modifies the following files:
%WINDIR%\Tasks .scr
%ALLUSERSPROFILE%\Start Menu\Programs\Startup .scr
Creates the following files on removable media:
<Drive name for removable media>:\win7~.exe
<Drive name for removable media>:\autorun.inf
Malicious functions:
To bypass firewall, removes or modifies the following registry keys:
[<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '"%TEMP%\7~EV^7.eXe"' = '"%TEMP%\7~EV^7.eXe:*:Enabled:Windows" Update'
[<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '<Full path to virus>' = '<Full path to virus>:*:Enabled:Windows Update'
To complicate detection of its presence in the operating system,
forces the system hide from view:
hidden files
file extensions
Executes the following:
<SYSTEM32>\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v ""%TEMP%\7~EV^7.eXe"" /t REG_SZ /d ""%TEMP%\7~EV^7.eXe"" /f
<SYSTEM32>\reg.exe ADD HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "<Full path to virus>" /d "<Full path to virus>:*:Enabled:Windows Update" /f
<SYSTEM32>\ftp.exe -s:rr3h6
<SYSTEM32>\reg.exe ADD HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v ""%TEMP%\7~EV^7.eXe"" /d ""%TEMP%\7~EV^7.eXe":*:Enabled:Windows Update" /f
<SYSTEM32>\reg.exe ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /V ShowSuperHidden /T REG_DWORD /D 00000000 /F
<SYSTEM32>\reg.exe ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /V Hidden /T REG_DWORD /D 00000002 /F
<SYSTEM32>\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "<Full path to virus>" /t REG_SZ /d "<Full path to virus>" /f
<SYSTEM32>\reg.exe ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /V HideFileExt /T REG_DWORD /D 00000001 /F
Terminates or attempts to terminate
the following user processes:
Modifies file system :
Creates the following files:
%WINDIR%\msagent .scr
%WINDIR%\msapps .scr
%WINDIR%\Media .scr
%WINDIR%\Microsoft.NET .scr
%WINDIR%\mui .scr
%WINDIR%\pchealth .scr
%WINDIR%\PeerNet .scr
%WINDIR%\OemDir .scr
%WINDIR%\Offline Web Pages .scr
%WINDIR%\java .scr
%WINDIR%\Driver Cache .scr
%WINDIR%\ehome .scr
%WINDIR%\Debug .scr
%WINDIR%\Downloaded Program Files .scr
%WINDIR%\Fonts .scr
%WINDIR%\inf .scr
%WINDIR%\Installer .scr
%WINDIR%\Help .scr
%WINDIR%\ime .scr
%WINDIR%\Temp .scr
%WINDIR%\twain_32 .scr
<SYSTEM32> .scr
<Auxiliary element>
%WINDIR%\Web .scr
%TEMP%\%USERNAME%_USER-4BB09A9C02.txt
%TEMP%\rr3h6
%WINDIR%\WinSxS .scr
%WINDIR%\<Auxiliary name> .scr
%WINDIR%\system .scr
%WINDIR%\pss .scr
%WINDIR%\Registration .scr
%WINDIR%\Prefetch .scr
%WINDIR%\Provisioning .scr
%WINDIR%\repair .scr
%WINDIR%\SoftwareDistribution .scr
%WINDIR%\srchasst .scr
%WINDIR%\Resources .scr
%WINDIR%\security .scr
%PROGRAM_FILES%\Movie Maker .scr
%PROGRAM_FILES%\MSBuild .scr
%PROGRAM_FILES%\microsoft frontpage .scr
%PROGRAM_FILES%\Microsoft.NET .scr
%PROGRAM_FILES%\MSN .scr
%PROGRAM_FILES%\NetMeeting .scr
%PROGRAM_FILES%\Online Services .scr
%PROGRAM_FILES%\MSN Gaming Zone .scr
%PROGRAM_FILES%\MSXML 6.0 .scr
%PROGRAM_FILES%\Messenger .scr
%ALLUSERSPROFILE%\Start Menu\Programs\Accessories .scr
%ALLUSERSPROFILE%\Start Menu\Programs\Administrative Tools .scr
%TEMP%\7~EV^7.eXe
%HOMEPATH%\Start Menu\Programs .scr
%ALLUSERSPROFILE%\Start Menu\Programs\Games .scr
%PROGRAM_FILES%\FireFox .scr
%PROGRAM_FILES%\Internet Explorer .scr
%CommonProgramFiles% .scr
%PROGRAM_FILES%\ComPlus Applications .scr
%WINDIR%\$NtUninstallWIC$ .scr
%WINDIR%\addins .scr
%HOMEPATH%\My Documents\My Pictures .scr
%WINDIR%\$MSI31Uninstall_KB893803v2$ .scr
%WINDIR%\AppPatch .scr
%WINDIR%\Connection Wizard .scr
%WINDIR%\Cursors .scr
%WINDIR%\assembly .scr
%WINDIR%\Config .scr
%HOMEPATH%\My Documents\My Music .scr
%PROGRAM_FILES%\Uninstall Information .scr
%PROGRAM_FILES%\Windows Media Player .scr
%PROGRAM_FILES%\Outlook Express .scr
%PROGRAM_FILES%\Reference Assemblies .scr
%PROGRAM_FILES%\Windows NT .scr
%PROGRAM_FILES%\<Auxiliary name> .scr
%HOMEPATH%\My Documents\Downloads .scr
%PROGRAM_FILES%\WindowsUpdate .scr
%PROGRAM_FILES%\xerox .scr
Sets the 'hidden' attribute to the following files:
<Drive name for removable media>:\win7~.exe
<Drive name for removable media>:\autorun.inf
Network activity:
Connects to:
'ft#.##free.com.br':21
'localhost':1039
UDP:
DNS ASK ft#.##free.com.br
Miscellaneous:
Searches for the following windows:
ClassName: 'NDDEAgnt' WindowName: 'NetDDE Agent'
ClassName: 'MS_WINHELP' WindowName: ''
Descargue Dr.Web para Android
Gratis por 3 meses
Todos los componentes de protección
Renovación de la demo a través de AppGallery/Google Pay
Si Vd. continúa usando este sitio web, esto significa que Vd. acepta el uso de archivos Cookie y otras tecnologías para que recabemos las estadísticas sobre los visitantes. Más información
OK