Mi biblioteca
Mi biblioteca

+ Añadir a la biblioteca

Soporte
Soporte 24 horas | Normas de contactar

Sus solicitudes

Perfil

Win32.HLLW.Autoruner2.52917

Added to the Dr.Web virus database: 2019-07-22

Virus description added:

Technical Information

To ensure autorun and distribution
Creates the following files on removable media
  • <Drive name for removable media>:\854d95dbf8528a541a1fabc078995c0a.exe
  • <Drive name for removable media>:\hadac_newsletter_july_2010_final.docx.lnk
  • <Drive name for removable media>:\holycrosschurchinstructions.docx.lnk
  • <Drive name for removable media>:\thlps_keeper_mayer_1965.docx.lnk
  • <Drive name for removable media>:\508softwareandos.doc.lnk
  • <Drive name for removable media>:\applicantform_en.doc.lnk
  • <Drive name for removable media>:\weeklysheet1215.doc.lnk
  • <Drive name for removable media>:\cveuropeo.doc.lnk
  • <Drive name for removable media>:\sdksampleunprivdeveloper.cer.lnk
  • <Drive name for removable media>:\winmine.exe.lnk
  • <Drive name for removable media>:\testee.cer.lnk
  • <Drive name for removable media>:\contoso_1.cer.lnk
  • <Drive name for removable media>:\dashborder_120.bmp.lnk
  • <Drive name for removable media>:\tileimage.bmp.lnk
  • <Drive name for removable media>:\dashborder_192.bmp.lnk
  • <Drive name for removable media>:\dialmap.bmp.lnk
  • <Drive name for removable media>:\split.avi.lnk
  • <Drive name for removable media>:\000814251_video_01.avi.lnk
  • <Drive name for removable media>:\join.avi.lnk
  • <Drive name for removable media>:\testcertificate.cer.lnk
  • <Drive name for removable media>:\notepad.exe.lnk
Malicious functions
Executes the following
  • '<SYSTEM32>\netsh.exe' firewall add allowedprogram "<Full path to file>" "<File name>.exe" ENABLE
Modifies file system
Sets the 'hidden' attribute to the following files
  • <Drive name for removable media>:\854d95dbf8528a541a1fabc078995c0a.exe
Network activity
UDP
  • DNS ASK da##.ddns.net
Miscellaneous
Creates and executes the following
  • '<SYSTEM32>\netsh.exe' firewall add allowedprogram "<Full path to file>" "<File name>.exe" ENABLE' (with hidden window)