La mia libreria
La mia libreria

+ Aggiungi alla libreria

Supporto
Supporto 24/7 | Regole per contattare

Richieste

Profile

Win32.HLLW.Autoruner.52769

Aggiunto al database dei virus Dr.Web: 2011-06-28

La descrizione è stata aggiunta:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Microsoft Service Host' = '%HOMEPATH%\Start Menu\Programs\Startup\mscvhost.exe'
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Shell' = 'Explorer.exe huelar.exe'
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'winlogos.exe' = '%WINDIR%\winlogos.exe /s'
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Huelar Services 2.0' = '<SYSTEM32>\huelar.exe'
Creates or modifies the following files:
  • %HOMEPATH%\Start Menu\Programs\Startup\mscvhost.exe
Creates the following files on removable media:
  • <Drive name for removable media>:\Folder.htt
  • <Drive name for removable media>:\desktop.ini
  • <Drive name for removable media>:\My Sexy Photos.exe
  • <Drive name for removable media>:\console.exe
  • <Drive name for removable media>:\Autorun.inf
  • <Drive name for removable media>:\x64console.exe
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
  • hidden files
  • file extensions
blocks execution of the following system utilities:
  • Windows Task Manager (Taskmgr)
  • Registry Editor (RegEdit)
Creates and executes the following:
  • %WINDIR%\winlogos.exe /s
  • %HOMEPATH%\Start Menu\Programs\Startup\mscvhost.exe 
  • <SYSTEM32>\huelar.exe 
Executes the following:
  • %WINDIR%\explorer.exe <Virus name>
Terminates or attempts to terminate
the following user processes:
  • fsavgui.exe
  • AVPM.EXE
  • AVPCC.EXE
  • GUARD.EXE
  • ZONEALARM.EXE
  • nod32.exe
  • NAVAPW32.EXE
  • AVGCC32.EXE
  • avgcc.exe
  • ashAvast.exe
  • AVGCTRL.EXE
  • AVP32.EXE
  • AVP.EXE
  • AVP.COM
Modifies settings of Windows Explorer:
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer] 'NoFolderOptions' = '00000001'
Modifies settings of Windows Internet Explorer:
  • [<HKCU>\Software\Microsoft\Internet Explorer\Main] 'Window Title' = 'Huelar Browser'
Sets a new unauthorized home page for Windows Internet Explorer.
Modifies file system :
Creates the following files:
  • %APPDATA%\Microsoft\CryptnetUrlCache\Content.exe
  • %APPDATA%\Microsoft\CryptnetUrlCache\MetaData.exe
  • %APPDATA%\Microsoft\CryptnetUrlCache.exe
  • %APPDATA%\Microsoft\Credentials.exe
  • %APPDATA%\Microsoft\Credentials\S-1-5-21-1275210071-117609710-1801674531-500.exe
  • %APPDATA%\Microsoft\Media Player.exe
  • %APPDATA%\Microsoft\MMC.exe
  • %APPDATA%\Microsoft\Internet Explorer\Quick Launch.exe
  • %APPDATA%\Microsoft\HTML Help.exe
  • %APPDATA%\Microsoft\Internet Explorer.exe
  • <Current directory>.exe
  • C:\Documents and Settings.exe
  • %WINDIR%\huelar.exe
  • %WINDIR%\winlogos.exe
  • <SYSTEM32>\huelar.exe
  • %APPDATA%\Identities\{4FF38130-294D-42C8-BD62-3A52854427FF}.exe
  • %APPDATA%\Microsoft.exe
  • %APPDATA%\Identities.exe
  • %HOMEPATH%.exe
  • %APPDATA%.exe
Sets the 'hidden' attribute to the following files:
  • <SYSTEM32>\huelar.exe
  • %WINDIR%\winlogos.exe
  • %HOMEPATH%\Start Menu\Programs\Startup\mscvhost.exe
  • %WINDIR%\huelar.exe
  • <Drive name for removable media>:\desktop.ini
  • <Drive name for removable media>:\Autorun.inf
  • <Drive name for removable media>:\console.exe
  • <Drive name for removable media>:\Folder.htt
  • <Drive name for removable media>:\x64console.exe
Deletes the following files:
  • <Drive name for removable media>:\Autorun.inf
Network activity:
Connects to:
  • '<Private IP address>':139
  • '<Private IP address>':445
UDP:
  • DNS ASK localdomain
  • DNS ASK ya##o.com
Miscellaneous:
Searches for the following windows:
  • ClassName: '' WindowName: 'MS_WebcheckMonitor'
  • ClassName: '' WindowName: 'Program Manager'
  • ClassName: '' WindowName: 'Connections Tray'
  • ClassName: '' WindowName: 'Power Meter'
  • ClassName: '' WindowName: '3? Floppy (A:)'
  • ClassName: '' WindowName: '3? Floppy (B:)'
  • ClassName: '' WindowName: 'SysFader'
  • ClassName: '' WindowName: '<Virus name>'
  • ClassName: '' WindowName: 'Tiny H-Pot v1.6'
  • ClassName: '' WindowName: ''
  • ClassName: '' WindowName: 'Windows Explorer'
  • ClassName: '' WindowName: 'CiceroUIWndFrame'
  • ClassName: '' WindowName: 'TF_FloatingLangBar_WndTitle'
  • ClassName: '' WindowName: '<SYSTEM32>\cscript.exe'
  • ClassName: '' WindowName: '<Auxiliary name>'
  • ClassName: '' WindowName: 'Form1'
  • ClassName: '' WindowName: '<Auxiliary name> - build Mar 22 2011'