Para el funcionamiento correcto del sitio web, debe activar el soporte de JavaScript en su navegador.
Win32.HLLW.Autoruner1.57835
Added to the Dr.Web virus database:
2013-10-07
Virus description added:
2013-10-08
Technical Information
To ensure autorun and distribution:
Creates the following services:
[<HKLM>\SYSTEM\ControlSet001\Services\csrsss] 'Start' = '00000002'
Malicious functions:
To bypass firewall, removes or modifies the following registry keys:
[<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '%CommonProgramFiles%\System\csrsss.exe' = '%CommonProgramFiles%\System\csrsss.exe:*:Enabled:CSR System Services'
Creates and executes the following:
'%CommonProgramFiles%\System\csrsss.exe'
Searches for windows to
detect analytical utilities:
ClassName: '(null)' WindowName: 'File Monitor - Sysinternals: www.sysinternals.com'
ClassName: '(null)' WindowName: 'Process Monitor - Sysinternals: www.sysinternals.com'
Modifies file system :
Creates the following files:
%CommonProgramFiles%\System\csrsss.exe
Sets the 'hidden' attribute to the following files:
%CommonProgramFiles%\System\csrsss.exe
Network activity:
Connects to:
'<Private IP address>':0
'se##er2.com':6667
'se##er.com':6667
UDP:
DNS ASK se##er2.com
DNS ASK se##er.com
Miscellaneous:
Searches for the following windows:
ClassName: '(null)' WindowName: 'Security Task Manager - Alexander Neuber'
ClassName: '(null)' WindowName: 'CurrProcess'
ClassName: '(null)' WindowName: 'SwitchSniffer v1.3.2.0 UnRegistered'
ClassName: '(null)' WindowName: 'Auto Start and Process Viewer : www.konradp.com'
ClassName: '(null)' WindowName: 'Soft191 Process Viewer'
ClassName: '(null)' WindowName: 'Process Heap Viewer - www.SecurityXploded.com'
ClassName: '(null)' WindowName: 'Remote Process Viewer for Windows Networks'
ClassName: '(null)' WindowName: 'SwitchSniffer v1.3.2.0 Registered'
ClassName: '(null)' WindowName: 'Project 1 - Packet Analyzer - Colasoft Capsa'
ClassName: '(null)' WindowName: 'The Wireshark Network Analyzer'
ClassName: '(null)' WindowName: 'Ether Detect'
ClassName: '(null)' WindowName: 'TCPView - Sysinternals: www.sysinternals.com'
ClassName: '(null)' WindowName: 'PIAFCTM - Stopped'
ClassName: '(null)' WindowName: 'PIAFCTM - Waiting'
ClassName: '(null)' WindowName: 'Process Explorer - Sysinternals: www.sysinternals.com'
Descargue Dr.Web para Android
Gratis por 3 meses
Todos los componentes de protección
Renovación de la demo a través de AppGallery/Google Pay
Si Vd. continúa usando este sitio web, esto significa que Vd. acepta el uso de archivos Cookie y otras tecnologías para que recabemos las estadísticas sobre los visitantes. Más información
OK