Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Win32.HLLW.Autoruner3.2412

Added to the Dr.Web virus database: 2020-06-27

Virus description added:

Technical Information

To ensure autorun and distribution
Creates or modifies the following files
  • %APPDATA%\microsoft\windows\start menu\programs\startup\<File name>.exe
  • <SYSTEM32>\tasks\skype
Creates the following files on removable media
  • <Drive name for removable media>:\<File name>.exe
  • <Drive name for removable media>:\508softwareandos.lnk
  • <Drive name for removable media>:\sdksampleprivdeveloper.lnk
  • <Drive name for removable media>:\contoso.lnk
  • <Drive name for removable media>:\sdkfailsafeemulator.lnk
  • <Drive name for removable media>:\testcertificate.lnk
  • <Drive name for removable media>:\contosoroot.lnk
  • <Drive name for removable media>:\contoso_1.lnk
  • <Drive name for removable media>:\sdksampleunprivdeveloper.lnk
  • <Drive name for removable media>:\default.lnk
  • <Drive name for removable media>:\dialmap.lnk
  • <Drive name for removable media>:\dial.lnk
  • <Drive name for removable media>:\toolbar.lnk
  • <Drive name for removable media>:\dashborder_144.lnk
  • <Drive name for removable media>:\split.lnk
  • <Drive name for removable media>:\000814251_video_01.lnk
  • <Drive name for removable media>:\applicantform_en.lnk
  • <Drive name for removable media>:\february_catalogue__2015.lnk
Modifies file system
Creates the following files
  • %PROGRAMDATA%\<File name>.exe
Sets the 'hidden' attribute to the following files
  • <Drive name for removable media>:\<File name>.exe
Network activity
TCP
HTTP POST requests
  • http://ta###.#ublicvm.com:5/Vre via ta###.publicvm.com
UDP
  • DNS ASK ta###.publicvm.com
Miscellaneous
Creates and executes the following
  • '%PROGRAMDATA%\<File name>.exe'
  • '%WINDIR%\syswow64\schtasks.exe' /create /sc minute /mo 1 /tn Skype /tr "%PROGRAMDATA%\<File name>.exe"' (with hidden window)
Executes the following
  • '%WINDIR%\syswow64\schtasks.exe' /create /sc minute /mo 1 /tn Skype /tr "%PROGRAMDATA%\<File name>.exe"