JavaScript support is required for our site to be fully operational in your browser.
Win32.HLLW.Autoruner1.57835
Added to the Dr.Web virus database:
2013-10-07
Virus description added:
2013-10-08
Technical Information
To ensure autorun and distribution:
Creates the following services:
[<HKLM>\SYSTEM\ControlSet001\Services\csrsss] 'Start' = '00000002'
Malicious functions:
To bypass firewall, removes or modifies the following registry keys:
[<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '%CommonProgramFiles%\System\csrsss.exe' = '%CommonProgramFiles%\System\csrsss.exe:*:Enabled:CSR System Services'
Creates and executes the following:
'%CommonProgramFiles%\System\csrsss.exe'
Searches for windows to
detect analytical utilities:
ClassName: '(null)' WindowName: 'File Monitor - Sysinternals: www.sysinternals.com'
ClassName: '(null)' WindowName: 'Process Monitor - Sysinternals: www.sysinternals.com'
Modifies file system :
Creates the following files:
%CommonProgramFiles%\System\csrsss.exe
Sets the 'hidden' attribute to the following files:
%CommonProgramFiles%\System\csrsss.exe
Network activity:
Connects to:
'<Private IP address>':0
'se##er2.com':6667
'se##er.com':6667
UDP:
DNS ASK se##er2.com
DNS ASK se##er.com
Miscellaneous:
Searches for the following windows:
ClassName: '(null)' WindowName: 'Security Task Manager - Alexander Neuber'
ClassName: '(null)' WindowName: 'CurrProcess'
ClassName: '(null)' WindowName: 'SwitchSniffer v1.3.2.0 UnRegistered'
ClassName: '(null)' WindowName: 'Auto Start and Process Viewer : www.konradp.com'
ClassName: '(null)' WindowName: 'Soft191 Process Viewer'
ClassName: '(null)' WindowName: 'Process Heap Viewer - www.SecurityXploded.com'
ClassName: '(null)' WindowName: 'Remote Process Viewer for Windows Networks'
ClassName: '(null)' WindowName: 'SwitchSniffer v1.3.2.0 Registered'
ClassName: '(null)' WindowName: 'Project 1 - Packet Analyzer - Colasoft Capsa'
ClassName: '(null)' WindowName: 'The Wireshark Network Analyzer'
ClassName: '(null)' WindowName: 'Ether Detect'
ClassName: '(null)' WindowName: 'TCPView - Sysinternals: www.sysinternals.com'
ClassName: '(null)' WindowName: 'PIAFCTM - Stopped'
ClassName: '(null)' WindowName: 'PIAFCTM - Waiting'
ClassName: '(null)' WindowName: 'Process Explorer - Sysinternals: www.sysinternals.com'
Download Dr.Web for Android
Free three-month trial
All protection features available
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more
OK