Para el funcionamiento correcto del sitio web, debe activar el soporte de JavaScript en su navegador.
Win32.HLLW.Autoruner1.10602
Added to the Dr.Web virus database:
2012-01-05
Virus description added:
2019-10-16
Technical Information
To ensure autorun and distribution
Modifies the following registry keys
[<HKLM>\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run] 'SysAnti' = '%CommonProgramFiles(x86)%\SysAnti.exe'
Creates the following services
[<HKLM>\System\CurrentControlSet\Services\DrvKiller] 'ImagePath' = '%WINDIR%\Fonts\cmcw.fon'
[<HKLM>\System\CurrentControlSet\Services\DrvKiller] 'ImagePath' = '%WINDIR%\Fonts\nasa.fon'
Malicious functions
Injects code into
the following system processes:
%WINDIR%\syswow64\svchost.exe
Modifies file system
Creates the following files
%WINDIR%\fonts\buvit.dll
%WINDIR%\fonts\cmcw.fon
%WINDIR%\temp\udd34be.tmp
%CommonProgramFiles(x86)%\sysanti.exe
%WINDIR%\fonts\alqmt.dll
%WINDIR%\fonts\nasa.fon
Sets the 'hidden' attribute to the following files
%CommonProgramFiles(x86)%\sysanti.exe
Deletes the following files
%WINDIR%\temp\udd34be.tmp
%WINDIR%\fonts\cmcw.fon
%WINDIR%\fonts\nasa.fon
Miscellaneous
Creates and executes the following
'%CommonProgramFiles(x86)%\sysanti.exe' -One
'%CommonProgramFiles(x86)%\sysanti.exe' -One' (with hidden window)
'%WINDIR%\syswow64\svchost.exe' ' (with hidden window)
Executes the following
'%WINDIR%\syswow64\rundll32.exe' "%WINDIR%\Fonts\buvit.dll",MyKILLEntry
'%WINDIR%\syswow64\rundll32.exe' "%WINDIR%\Fonts\alqmt.dll",MyKILLEntry
'%WINDIR%\syswow64\svchost.exe'
Descargue Dr.Web para Android
Gratis por 3 meses
Todos los componentes de protección
Renovación de la demo a través de AppGallery/Google Pay
Si Vd. continúa usando este sitio web, esto significa que Vd. acepta el uso de archivos Cookie y otras tecnologías para que recabemos las estadísticas sobre los visitantes. Más información
OK