Para el funcionamiento correcto del sitio web, debe activar el soporte de JavaScript en su navegador.
Win32.HLLW.Autoruner1.58900
Added to the Dr.Web virus database:
2013-10-19
Virus description added:
2013-10-22
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
[<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] '@' = '<DRIVERS>\USBInfo.com'
[<HKCU>\Control Panel\Desktop] 'SCRNSAVE.EXE' = '<SYSTEM32>\ScreenSave.scr'
Creates the following files on removable media:
<Drive name for removable media>:\autorun.inf
<Drive name for removable media>:\╬─╝■╝╨.exe
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
hidden files
file extensions
blocks execution of the following system utilities:
Windows Task Manager (Taskmgr)
Creates and executes the following:
Executes the following:
'<SYSTEM32>\attrib.exe' +a +r +s +h "system volume information.exe"
'<SYSTEM32>\wscript.exe' +a +r +s +h "recycler.exe"
'<SYSTEM32>\taskkill.exe' "<DRIVERS>\USBSys.vbe"
'<SYSTEM32>\attrib.exe' +s +h "System Volume Information"
'<SYSTEM32>\attrib.exe' +s +h "WINDOWS"
'<SYSTEM32>\attrib.exe' +a +r +s +h "recycler.exe"
'<SYSTEM32>\wscript.exe' +a +r +s +h "system volume information.exe"
'<SYSTEM32>\attrib.exe' /s <DRIVERS>\USBInfo.sy_
'<SYSTEM32>\attrib.exe' /pid=3028
'<SYSTEM32>\attrib.exe' "<DRIVERS>\USBStor.vbe"
'<SYSTEM32>\attrib.exe' /pid=2920
'<SYSTEM32>\attrib.exe' /f /im usbmon.exe /im U┼╠▓б╢╛├т╥▀╞ў.exe /im USBCleaner.exe /im mmc.exe /im regedit.exe
'<SYSTEM32>\attrib.exe' /pid=2964
'<SYSTEM32>\attrib.exe' +s +h "RECYCLER"
'<SYSTEM32>\taskkill.exe' /f /im usbmon.exe /im U┼╠▓б╢╛├т╥▀╞ў.exe /im USBCleaner.exe /im mmc.exe /im regedit.exe
'%WINDIR%\regedit.exe' /s <DRIVERS>\USBInfo.sy_
'<SYSTEM32>\wscript.exe' "<DRIVERS>\USBSys.vbe"
'<SYSTEM32>\attrib.exe' -s -h <Full path to virus>
'<SYSTEM32>\wscript.exe' "<DRIVERS>\USBStor.vbe"
'<SYSTEM32>\wscript.exe' "<DRIVERS>\USBInfo.vbe"
'<SYSTEM32>\attrib.exe' +a +r +s +h ╬─╝■╝╨.exe
'<SYSTEM32>\attrib.exe' +s +h "Far2"
'<SYSTEM32>\attrib.exe' +s +h "<Auxiliary name>"
'<SYSTEM32>\attrib.exe' +s +h "Program Files"
'<SYSTEM32>\attrib.exe' +a +r +s +h autorun.inf
'<SYSTEM32>\attrib.exe' +s +h "bf32d3b0"
'<SYSTEM32>\attrib.exe' +s +h "Documents and Settings"
Injects code into
the following system processes:
<SYSTEM32>\attrib.exe
<SYSTEM32>\taskkill.exe
<SYSTEM32>\wscript.exe
Modifies settings of Windows Explorer:
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoFolderOptions' = '00000001'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoRun' = '00000001'
Modifies file system :
Creates the following files:
C:\Far2.exe
C:\<Auxiliary name>.exe
C:\Documents and Settings.exe
C:\desktop.ini
<Current directory>.exe
C:\System Volume Information.exe
%WINDIR%.exe
<Auxiliary element>
%PROGRAM_FILES%.exe
C:\RECYCLER.exe
C:\autorun.inf
<DRIVERS>\Driver.sys
<DRIVERS>\USBInfo.vbe
<DRIVERS>\USBStor.vbe
%TEMP%\~1.bat
<DRIVERS>\USBInfo.com
<DRIVERS>\USBSys.vbe
C:\╬─╝■╝╨.exe
<DRIVERS>\USBInfo.sy_
%TEMP%\~2.bat
<SYSTEM32>\ScreenSave.scr
Sets the 'hidden' attribute to the following files:
C:\System Volume Information.exe
C:\RECYCLER.exe
<Drive name for removable media>:\autorun.inf
<Drive name for removable media>:\╬─╝■╝╨.exe
%TEMP%\~2.bat
%TEMP%\~1.bat
C:\autorun.inf
C:\╬─╝■╝╨.exe
Deletes the following files:
C:\desktop.ini
%TEMP%\~1.bat
<DRIVERS>\Driver.sys
Miscellaneous:
Searches for the following windows:
ClassName: 'RegEdit_RegEdit' WindowName: '(null)'
ClassName: '(null)' WindowName: '(null)'
Descargue Dr.Web para Android
Gratis por 3 meses
Todos los componentes de protección
Renovación de la demo a través de AppGallery/Google Pay
Si Vd. continúa usando este sitio web, esto significa que Vd. acepta el uso de archivos Cookie y otras tecnologías para que recabemos las estadísticas sobre los visitantes. Más información
OK