JavaScript support is required for our site to be fully operational in your browser.
Win32.HLLW.Autoruner2.200
Added to the Dr.Web virus database:
2013-12-25
Virus description added:
2013-12-26
Technical Information
To ensure autorun and distribution:
Creates the following files on removable media:
<Drive name for removable media>:\autorun.inf
<Drive name for removable media>:\autorun.exe
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
hidden files
file extensions
Executes the following:
Terminates or attempts to terminate
the following system processes:
Modifies file system :
Moves itself:
from <Full path to virus> to %TEMP%\tmp296.tmp
Network activity:
Connects to:
TCP:
UDP:
DNS ASK dl.#####oxusercontent.com
DNS ASK wp#d
Miscellaneous:
Searches for the following windows:
ClassName: '' WindowName: '(null)'
ClassName: 'OleMainThreadWndClass' WindowName: '(null)'
ClassName: 'CSCHiddenWindow' WindowName: '(null)'
ClassName: 'SystemTray_Main' WindowName: '(null)'
ClassName: 'Shell_TrayWnd' WindowName: '(null)'
ClassName: 'Proxy Desktop' WindowName: '(null)'
ClassName: 'SysListView32' WindowName: '(null)'
ClassName: 'BaseBar' WindowName: 'ChanApp'
Download Dr.Web for Android
Free three-month trial
All protection features available
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more
OK