Para el funcionamiento correcto del sitio web, debe activar el soporte de JavaScript en su navegador.
Win32.HLLW.Autoruner1.35435
Added to the Dr.Web virus database:
2013-04-21
Virus description added:
2013-04-29
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
[<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks] '{8E1D7026-B54D-4DC8-A460-D182EA743798}' = ''
Creates the following files on removable media:
<Drive name for removable media>:\AutoRun.Inf
<Drive name for removable media>:\Recycled\AutoRun.dll
<Drive name for removable media>:\Recycled\desktop.ini
Malicious functions:
Injects code into
the following system processes:
Modifies file system :
Creates the following files:
Sets the 'hidden' attribute to the following files:
<Drive name for removable media>:\AutoRun.Inf
<Drive name for removable media>:\Recycled\AutoRun.dll
<Drive name for removable media>:\Recycled\desktop.ini
Deletes the following files:
<Drive name for removable media>:\AutoRun.Inf
<Drive name for removable media>:\Recycled\AutoRun.dll
<Drive name for removable media>:\Recycled\desktop.ini
Network activity:
Connects to:
'it###.8866.org':80
'y0###1.vicp.net':80
TCP:
HTTP GET requests:
it###.8866.org/xp.asp?id#################################
y0###1.vicp.net/xp.asp?id#################################
UDP:
DNS ASK y0###.vicp.net
DNS ASK y0###3.vicp.net
DNS ASK y0###1.vicp.net
DNS ASK it###.8866.org
Descargue Dr.Web para Android
Gratis por 3 meses
Todos los componentes de protección
Renovación de la demo a través de AppGallery/Google Pay
Si Vd. continúa usando este sitio web, esto significa que Vd. acepta el uso de archivos Cookie y otras tecnologías para que recabemos las estadísticas sobre los visitantes. Más información
OK