Para el funcionamiento correcto del sitio web, debe activar el soporte de JavaScript en su navegador.
Win32.HLLW.Autoruner1.10956
Added to the Dr.Web virus database:
2012-01-13
Virus description added:
2012-01-13
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Microsoft' = 'C:\Program File\Microsoft\MicrosoftSafety.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Microsoft' = 'C:\Program File\Microsoft\MicrosoftSafety.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Microsoft' = ' C:\Program File\Microsoft\MicrosoftSafety.exe'
Creates the following files on removable media:
<Drive name for removable media>:\autorun.inf
<Drive name for removable media>:\C0MM\C0MM\svchost.exe
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
hidden files
file extensions
Executes the following:
<SYSTEM32>\reg.exe add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v HideFileExt /t REG_DWORD /d 1 /f
<SYSTEM32>\net1.exe users /add SYS_4321 passPass
<SYSTEM32>\reg.exe add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v ShowSuperHidden /t REG_DWORD /d 0 /f
<SYSTEM32>\attrib.exe +s +h +r E:\autorun.inf
<SYSTEM32>\reg.exe add "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\Userlist" /v SYS_4321 /t REG_DWORD /d 0 /f
<SYSTEM32>\reg.exe add "HKEY_CLASSES_ROOT\Network\SharingHandler" /v "" /t REG_SZ /d "" /f
<SYSTEM32>\net1.exe users SYS_4321 passPass
<SYSTEM32>\reg.exe add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system" /v shutdownwithoutlogon /d 0 /t REG_DWORD /f
<SYSTEM32>\reg.exe add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v Microsoft /d "C:\Program File\Microsoft\MicrosoftSafety.exe" /f
<SYSTEM32>\reg.exe add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v Microsoft /d "C:\Program File\Microsoft\MicrosoftSafety.exe" /f
<SYSTEM32>\reg.exe add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v Microsoft /d " C:\Program File\Microsoft\MicrosoftSafety.exe" /f
<SYSTEM32>\reg.exe DELETE "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\IniFileMapping\Autorun.inf" /f
<SYSTEM32>\net1.exe localgroup %USERNAME%s /add SYS_4321
<SYSTEM32>\attrib.exe +s +H "C:\Program File"
<SYSTEM32>\attrib.exe +s +H "C:\Program File\Microsoft"
<SYSTEM32>\attrib.exe +s +H C:\C0MM
<SYSTEM32>\attrib.exe +s +H "<Current directory>\<Virus name>"
<SYSTEM32>\tskill.exe taskmagr
<SYSTEM32>\net1.exe share SYS_C$=C:\
<SYSTEM32>\attrib.exe +s +H C:\C0MM\C0MM
<SYSTEM32>\attrib.exe +s +H E:\C0MM
<SYSTEM32>\attrib.exe +s +H E:\C0MM\C0MM
<SYSTEM32>\attrib.exe -r -a E:\autorun.inf
<SYSTEM32>\attrib.exe -r -a C:\autorun.inf
<SYSTEM32>\attrib.exe +s +h +r C:\autorun.inf
<SYSTEM32>\net1.exe share SYS_E$=E:\
Modifies file system :
Creates the following files:
C:\C0MM\C0MM\svchost.exe
C:\autorun.inf
C:\Program File\Microsoft\MicrosoftSafety.exe
Sets the 'hidden' attribute to the following files:
<Drive name for removable media>:\autorun.inf
C:\autorun.inf
Miscellaneous:
Searches for the following windows:
ClassName: 'Indicator' WindowName: ''
ClassName: '' WindowName: ''
ClassName: '' WindowName: 'af32d3b0'
Descargue Dr.Web para Android
Gratis por 3 meses
Todos los componentes de protección
Renovación de la demo a través de AppGallery/Google Pay
Si Vd. continúa usando este sitio web, esto significa que Vd. acepta el uso de archivos Cookie y otras tecnologías para que recabemos las estadísticas sobre los visitantes. Más información
OK