Per il corretto funzionamento del sito, è necessario attivare il supporto di JavaScript nel browser.
Win32.HLLW.Autoruner.52430
Aggiunto al database dei virus Dr.Web:
2011-06-21
La descrizione è stata aggiunta:
2011-06-24
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
[<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] '"%TEMP%\ayvv.exe"' = '"%TEMP%\ayvv.exe"'
Creates or modifies the following files:
%WINDIR%\Tasks .scr
%ALLUSERSPROFILE%\Start Menu\Programs\Startup .scr
Creates the following files on removable media:
<Drive name for removable media>:\win7~.exe
<Drive name for removable media>:\autorun.inf
Malicious functions:
To bypass firewall, removes or modifies the following registry keys:
[<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '"%TEMP%\ayvv.exe"' = '"%TEMP%\ayvv.exe:*:Enabled:Windows" Update'
To complicate detection of its presence in the operating system,
forces the system hide from view:
hidden files
file extensions
Executes the following:
<SYSTEM32>\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v ""%TEMP%\ayvv.exe"" /t REG_SZ /d ""%TEMP%\ayvv.exe"" /f
<SYSTEM32>\reg.exe ADD HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v ""%TEMP%\ayvv.exe"" /d ""%TEMP%\ayvv.exe":*:Enabled:Windows Update" /f
<SYSTEM32>\reg.exe ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /V HideFileExt /T REG_DWORD /D 00000001 /F
<SYSTEM32>\reg.exe ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /V Hidden /T REG_DWORD /D 00000002 /F
<SYSTEM32>\reg.exe ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /V ShowSuperHidden /T REG_DWORD /D 00000000 /F
Modifies file system :
Creates the following files:
%WINDIR%\msapps .scr
%WINDIR%\mui .scr
%WINDIR%\Microsoft.NET .scr
%WINDIR%\msagent .scr
%WINDIR%\OemDir .scr
%WINDIR%\PeerNet .scr
%WINDIR%\Prefetch .scr
%WINDIR%\Offline Web Pages .scr
%WINDIR%\pchealth .scr
%WINDIR%\Fonts .scr
%WINDIR%\Help .scr
%WINDIR%\Driver Cache .scr
%WINDIR%\ehome .scr
%WINDIR%\ime .scr
%WINDIR%\java .scr
%WINDIR%\Media .scr
%WINDIR%\inf .scr
%WINDIR%\Installer .scr
%WINDIR%\Temp .scr
%WINDIR%\twain_32 .scr
<SYSTEM32> .scr
<Auxiliary element>
%WINDIR%\Web .scr
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\ct[1].php
%TEMP%\ct_6$
%WINDIR%\WinSxS .scr
%WINDIR%\<Auxiliary name> .scr
%WINDIR%\Registration .scr
%WINDIR%\repair .scr
%WINDIR%\Provisioning .scr
%WINDIR%\pss .scr
%WINDIR%\Resources .scr
%WINDIR%\srchasst .scr
%WINDIR%\system .scr
%WINDIR%\security .scr
%WINDIR%\SoftwareDistribution .scr
%WINDIR%\Downloaded Program Files .scr
%PROGRAM_FILES%\Microsoft.NET .scr
%PROGRAM_FILES%\Movie Maker .scr
%PROGRAM_FILES%\Messenger .scr
%PROGRAM_FILES%\microsoft frontpage .scr
%PROGRAM_FILES%\MSBuild .scr
%PROGRAM_FILES%\MSXML 6.0 .scr
%PROGRAM_FILES%\NetMeeting .scr
%PROGRAM_FILES%\MSN .scr
%PROGRAM_FILES%\MSN Gaming Zone .scr
%ALLUSERSPROFILE%\Start Menu\Programs\Accessories .scr
%ALLUSERSPROFILE%\Start Menu\Programs\Administrative Tools .scr
%TEMP%\ayvv.exe
%HOMEPATH%\Start Menu\Programs .scr
%ALLUSERSPROFILE%\Start Menu\Programs\Games .scr
%PROGRAM_FILES%\FireFox .scr
%PROGRAM_FILES%\Internet Explorer .scr
%CommonProgramFiles% .scr
%PROGRAM_FILES%\ComPlus Applications .scr
%WINDIR%\addins .scr
%WINDIR%\AppPatch .scr
%WINDIR%\$MSI31Uninstall_KB893803v2$ .scr
%WINDIR%\$NtUninstallWIC$ .scr
%WINDIR%\assembly .scr
%WINDIR%\Cursors .scr
%WINDIR%\Debug .scr
%WINDIR%\Config .scr
%WINDIR%\Connection Wizard .scr
%PROGRAM_FILES%\Reference Assemblies .scr
%PROGRAM_FILES%\Uninstall Information .scr
%PROGRAM_FILES%\Online Services .scr
%PROGRAM_FILES%\Outlook Express .scr
%PROGRAM_FILES%\Windows Media Player .scr
%PROGRAM_FILES%\xerox .scr
%PROGRAM_FILES%\<Auxiliary name> .scr
%PROGRAM_FILES%\Windows NT .scr
%PROGRAM_FILES%\WindowsUpdate .scr
Sets the 'hidden' attribute to the following files:
<Drive name for removable media>:\win7~.exe
<Drive name for removable media>:\autorun.inf
Network activity:
Connects to:
'ay##.6te.net':80
'localhost':1035
TCP:
HTTP GET requests:
ay##.6te.net/hr/ct.php?s=#############################
UDP:
Miscellaneous:
Searches for the following windows:
ClassName: 'MS_WINHELP' WindowName: ''
Scaricate Dr.Web per Android
Gratis per 3 mesi
Tutti i componenti di protezione
Rinnovo versione di prova tramite AppGallery/Google Pay
Continuando a utilizzare questo sito, l'utente acconsente al nostro utilizzo di file Cookie e di altre tecnologie per la raccolta di informazioni statistiche sui visitatori. Per maggiori informazioni
OK