JavaScript support is required for our site to be fully operational in your browser.
Win32.HLLW.Autoruner1.27933
Added to the Dr.Web virus database:
2012-10-14
Virus description added:
2012-10-18
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Shell' = 'Explorer.exe, %WINDIR%\Windows.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = 'Explorer.exe, %TEMP%\Jumper.bat'
[<HKCU>\Control Panel\Desktop] 'SCRNSAVE.EXE' = '<SYSTEM32>\ssmypics.scr, %TEMP%\Jumper.bat'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'ctfmon.exe' = '<SYSTEM32>\ctfmon.exe, %WINDIR%\Windows.exe'
Creates the following files on removable media:
<Drive name for removable media>:\Autorun.inf
<Drive name for removable media>:\RECYCLER\Driver.exe
Malicious functions:
Executes the following:
<SYSTEM32>\reg.exe add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /V ctfmon.exe /T REG_SZ /D "<SYSTEM32>\ctfmon.exe, %WINDIR%\Windows.exe" /F
<SYSTEM32>\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /V Shell /T REG_SZ /D "Explorer.exe, %WINDIR%\Windows.exe" /F
<SYSTEM32>\reg.exe delete "HKCU\Software\Microsoft\Internet Explorer\Security" /F
<SYSTEM32>\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /V EmailName /T REG_SZ /D tiniresu@ /F
<SYSTEM32>\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /V Userinit /T REG_SZ /D "Explorer.exe, %TEMP%\Jumper.bat" /F
<SYSTEM32>\attrib.exe +H +S Z:\RECYCLER\Driver.exe
<SYSTEM32>\attrib.exe +H +S Z:\Autorun.inf
<SYSTEM32>\attrib.exe +H +S E:\RECYCLER\Driver.exe
<SYSTEM32>\attrib.exe +H +S E:\Autorun.inf
<SYSTEM32>\attrib.exe +H +S %WINDIR%\system\Network.bat
<SYSTEM32>\attrib.exe +H +S %TEMP%\Jumper.bat
<SYSTEM32>\cmd.exe /c ""%TEMP%\1.tmp\Driver.bat""
<SYSTEM32>\attrib.exe +H +S %WINDIR%\Windows.exe
<SYSTEM32>\reg.exe add "HKCU\Control Panel\Desktop" /V SCRNSAVE.EXE /T REG_SZ /D "<SYSTEM32>\ssmypics.scr, C:\Documents and Settings\%USERNAME%\LOCALS~1\Temp\Jumper.bat" /F
<SYSTEM32>\reg.exe add "HKCU\Software\Microsoft\Internet Account Manager\Accounts\00000001" /V "SMTP Display Name" /T REG_SZ /D "Tiniresu" /F
<SYSTEM32>\reg.exe add "HKCU\Software\Microsoft\Internet Account Manager\Accounts\00000001" /V "SMTP Email Address" /T REG_SZ /D "tiniresu@userinit.org" /F
<SYSTEM32>\reg.exe add HKCU\Software\MozillaPlugins\@adobe.com/FlashPlayer /V Path /T REG_SZ /D "<SYSTEM32>\Macromed\Flash\NPSWF32.dll, %WINDIR%\Windows.exe" /F
<SYSTEM32>\reg.exe add "HKCU\Software\Microsoft\Internet Account Manager\Accounts\00000001" /V "POP3 User Name" /T REG_SZ /D "Tiniresu" /F
Modifies file system :
Creates the following files:
%WINDIR%\system\Network.bat
%TEMP%\Jumper.bat
%TEMP%\1.tmp\Driver.bat
%WINDIR%\Windows.exe
Sets the 'hidden' attribute to the following files:
<Drive name for removable media>:\RECYCLER\Driver.exe
<Drive name for removable media>:\Autorun.inf
%TEMP%\Jumper.bat
%WINDIR%\Windows.exe
%WINDIR%\system\Network.bat
Deletes the following files:
Miscellaneous:
Searches for the following windows:
ClassName: 'Indicator' WindowName: ''
Download Dr.Web for Android
Free three-month trial
All protection features available
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more
OK