JavaScript support is required for our site to be fully operational in your browser.
Win32.HLLW.Siggen.7779
Added to the Dr.Web virus database:
2016-10-09
Virus description added:
2016-10-09
Technical Information
To ensure autorun and distribution:
Creates or modifies the following files:
<LS_APPDATA>\Start\update_backup.exe
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
hidden files
file extensions
Executes the following:
'%WINDIR%\Microsoft.NET\Framework\v2.0.50727\cvtres.exe' /NOLOGO /READONLY /MACHINE:IX86 "/OUT:%TEMP%\RES2.tmp" "%TEMP%\vbc1.tmp"
'%WINDIR%\Microsoft.NET\Framework\v2.0.50727\vbc.exe' /noconfig @"%TEMP%\maupqubv.cmdline"
'%WINDIR%\Microsoft.NET\Framework\v2.0.50727\cvtres.exe' /NOLOGO /READONLY /MACHINE:IX86 "/OUT:%TEMP%\RES4.tmp" "%TEMP%\vbc3.tmp"
'%TEMP%\update.exe'
'%TEMP%\svchost.exe'
'%WINDIR%\Microsoft.NET\Framework\v2.0.50727\vbc.exe' /noconfig @"%TEMP%\63tx2xvk.cmdline"
Modifies file system:
Creates the following files:
%TEMP%\O.resources
%TEMP%\whatdafock.txt
%TEMP%\ZVpPIoDe.resources
%TEMP%\RES2.tmp
%TEMP%\63tx2xvk.exe
%TEMP%\vbc3.tmp
%TEMP%\RES4.tmp
%TEMP%\maupqubv.out
%TEMP%\maupqubv.0.vb
%TEMP%\maupqubv.cmdline
<LS_APPDATA>\Start\update.exe
%TEMP%\iZpMip3r1.resources
%TEMP%\svchost.exe
%TEMP%\aoqdQC.resources
%TEMP%\update.exe
%TEMP%\63tx2xvk.out
%TEMP%\vbc1.tmp
%TEMP%\63tx2xvk.cmdline
%TEMP%\MSNPSharp.dll
%TEMP%\63tx2xvk.0.vb
Deletes the following files:
%TEMP%\63tx2xvk.cmdline
%TEMP%\63tx2xvk.exe
%TEMP%\vbc3.tmp
%TEMP%\RES4.tmp
%TEMP%\vbc1.tmp
%TEMP%\RES2.tmp
%TEMP%\63tx2xvk.0.vb
%TEMP%\63tx2xvk.out
Miscellaneous:
Searches for the following windows:
ClassName: '' WindowName: ''
Download Dr.Web for Android
Free three-month trial
All protection features available
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more
OK