To bypass firewall, removes or modifies the following registry keys:
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '%WINDIR%\system\svchost.exe' = '%WINDIR%\system\svchost.exe:*:enabled:Generic Host Process for Win32 Services'
To complicate detection of its presence in the operating system,
forces the system hide from view:
Creates and executes the following:
- '%WINDIR%\system\svchost.exe'
Executes the following:
- '<SYSTEM32>\cmd.exe' /c <Virus name>.bat
Terminates or attempts to terminate
the following user processes:
- iexplore.exe
- opera.exe
- firefox.exe
Modifies settings of Windows Internet Explorer:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings] 'ProxyEnable' = '00000001'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings] 'ProxyServer' = '127.0.0.1:39002'
Forces autoplay for removable media.