Per il corretto funzionamento del sito, è necessario attivare il supporto di JavaScript nel browser.
Win32.HLLW.Autoruner2.52847
Aggiunto al database dei virus Dr.Web:
2019-07-20
La descrizione è stata aggiunta:
2019-07-22
Technical Information
To ensure autorun and distribution
Modifies the following registry keys
[<HKCU>\software\microsoft\windows\currentversion\run] 'qjServieca' = 'wscript.exe //B "%TEMP%\qjServieca.vbs"'
[<HKLM>\software\microsoft\windows\currentversion\run] 'qjServieca' = 'wscript.exe //B "%TEMP%\qjServieca.vbs"'
Creates or modifies the following files
%APPDATA%\microsoft\windows\start menu\programs\startup\qjservieca.vbs
Creates the following files on removable media
<Drive name for removable media>:\qjservieca.vbs
<Drive name for removable media>:\middaugh_keynote.lnk
<Drive name for removable media>:\gruenspecht_02172016.lnk
<Drive name for removable media>:\indogerman2010.lnk
<Drive name for removable media>:\iso27k_isms_implementation_and_certification_process_overview_v2.lnk
<Drive name for removable media>:\samieee_obiee_presentation.lnk
<Drive name for removable media>:\proposaltemplates.lnk
<Drive name for removable media>:\file1.lnk
<Drive name for removable media>:\mappingconcepthubberlin.lnk
<Drive name for removable media>:\sim_gametheory_to_finance.lnk
<Drive name for removable media>:\arrow-down.lnk
<Drive name for removable media>:\elvisimp.lnk
<Drive name for removable media>:\asm.lnk
<Drive name for removable media>:\hhhlcert.lnk
<Drive name for removable media>:\investmentbankca_ca8.lnk
<Drive name for removable media>:\cert.lnk
<Drive name for removable media>:\systisoft.lnk
<Drive name for removable media>:\tunpersonalca1.lnk
<Drive name for removable media>:\irgeek.lnk
<Drive name for removable media>:\lom602.lnk
<Drive name for removable media>:\cleanlyrics.lnk
<Drive name for removable media>:\region-north-karelia.lnk
<Drive name for removable media>:\contenttypes.lnk
<Drive name for removable media>:\highly_cited_2001.lnk
<Drive name for removable media>:\disclosuredetails.lnk
<Drive name for removable media>:\excel_example.lnk
<Drive name for removable media>:\subjectclassification.lnk
<Drive name for removable media>:\removedtitles_records.lnk
<Drive name for removable media>:\productos.lnk
<Drive name for removable media>:\fiche_inscription_2015.lnk
<Drive name for removable media>:\1sm_price.lnk
<Drive name for removable media>:\calculatorworksheet.lnk
<Drive name for removable media>:\ff_ot_user_guide.lnk
<Drive name for removable media>:\roozenedowebinar.lnk
<Drive name for removable media>:\waterlandhealthkano.lnk
<Drive name for removable media>:\myhrvoldhanssenbiharfamine.lnk
<Drive name for removable media>:\router_manual.lnk
<Drive name for removable media>:\static_electricity_easy_and_quick_activities.lnk
<Drive name for removable media>:\military_callsigns_0311.lnk
<Drive name for removable media>:\fungalnameauthors.lnk
<Drive name for removable media>:\pandp.lnk
<Drive name for removable media>:\schema.lnk
<Drive name for removable media>:\20140114.lnk
<Drive name for removable media>:\babyboymaintonotesbackground_pal.lnk
<Drive name for removable media>:\skos.lnk
<Drive name for removable media>:\fil_20060629111052.lnk
<Drive name for removable media>:\2015-02-worms-nanoparticle-toxicity.lnk
<Drive name for removable media>:\7790_preview.lnk
<Drive name for removable media>:\contoso_1.lnk
<Drive name for removable media>:\utorrent.lnk
<Drive name for removable media>:\thlps_keeper_mayer_1965.lnk
<Drive name for removable media>:\aoc_saq_d_v3_merchant.lnk
<Drive name for removable media>:\file_p_00000000_1371597592.lnk
<Drive name for removable media>:\glidescope_review_rev_010.lnk
<Drive name for removable media>:\february_catalogue__2015.lnk
<Drive name for removable media>:\ovp25012015.lnk
<Drive name for removable media>:\weeklysheet1215.lnk
<Drive name for removable media>:\applicant.lnk
<Drive name for removable media>:\chromesetup.lnk
<Drive name for removable media>:\sdkfailsafeemulator.lnk
<Drive name for removable media>:\testcertificate.lnk
<Drive name for removable media>:\sdksampleprivdeveloper.lnk
<Drive name for removable media>:\contosoroot_1.lnk
<Drive name for removable media>:\tileimage.lnk
<Drive name for removable media>:\default.lnk
<Drive name for removable media>:\dialmap.lnk
<Drive name for removable media>:\000814251_video_01.lnk
<Drive name for removable media>:\split.lnk
<Drive name for removable media>:\lisp_success.lnk
<Drive name for removable media>:\babyboymaintoscenesbackground.lnk
<Drive name for removable media>:\jre-7u75-windows-i586-iftw.lnk
<Drive name for removable media>:\ituneshelpunavailable.lnk
<Drive name for removable media>:\wrar520.lnk
<Drive name for removable media>:\d0068197bb5a41fea16a220c45390606.lnk
<Drive name for removable media>:\video_1.lnk
<Drive name for removable media>:\clip_480_5sec_6mbps_h264.lnk
<Drive name for removable media>:\spanner.lnk
<Drive name for removable media>:\dag2_panel1_320_ref.lnk
<Drive name for removable media>:\2.lnk
<Drive name for removable media>:\3.lnk
<Drive name for removable media>:\13.lnk
<Drive name for removable media>:\64bit_notes.lnk
<Drive name for removable media>:\210252809.lnk
<Drive name for removable media>:\winmine.lnk
<Drive name for removable media>:\pushkin.lnk
<Drive name for removable media>:\alert.lnk
<Drive name for removable media>:\tree_view.lnk
<Drive name for removable media>:\adadsi.lnk
<Drive name for removable media>:\about.lnk
<Drive name for removable media>:\garden.lnk
<Drive name for removable media>:\browse.lnk
<Drive name for removable media>:\advice_process.lnk
<Drive name for removable media>:\168.lnk
<Drive name for removable media>:\price.lnk
Modifies file system
Creates the following files
%TEMP%\qjservieca.vbs
%TEMP%\umhworm 03419.vbs
Sets the 'hidden' attribute to the following files
<Drive name for removable media>:\qjservieca.vbs
Miscellaneous
Creates and executes the following
'<SYSTEM32>\wscript.exe' "%TEMP%\qjServieca.vbs"
'<SYSTEM32>\cmd.exe' /c ipconfig /release&%TEMP%\umHWorm 03419.vbs&ipconfig /renew' (with hidden window)
'<SYSTEM32>\cmd.exe' /c ipconfig /release&%TEMP%\qjServieca.vbs&ipconfig /renew' (with hidden window)
Executes the following
'<SYSTEM32>\cmd.exe' /c ipconfig /release&%TEMP%\qjServieca.vbs&ipconfig /renew
'<SYSTEM32>\cmd.exe' /c ipconfig /release&%TEMP%\umHWorm 03419.vbs&ipconfig /renew
'<SYSTEM32>\ipconfig.exe' /release
'<SYSTEM32>\ipconfig.exe' /renew
Scaricate Dr.Web per Android
Gratis per 3 mesi
Tutti i componenti di protezione
Rinnovo versione di prova tramite AppGallery/Google Pay
Continuando a utilizzare questo sito, l'utente acconsente al nostro utilizzo di file Cookie e di altre tecnologie per la raccolta di informazioni statistiche sui visitatori. Per maggiori informazioni
OK