Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Win32.HLLW.Autoruner1.30130

Added to the Dr.Web virus database: 2012-11-22

Virus description added:

Technical Information

To ensure autorun and distribution:
Creates or modifies the following files:
  • %HOMEPATH%\Start Menu\Programs\Startup\mhrhcrji.exe
Creates the following files on removable media:
  • <Drive name for removable media>:\RECYCLER\S-3-7-87-0220567110-5487338002-777162507-0146\hPIYfxoV.exe
  • <Drive name for removable media>:\autorun.inf
  • <Drive name for removable media>:\RECYCLER\S-3-7-87-0220567110-5487338002-777162507-0146\jJCvyWgO.cpl
Malicious functions:
Executes the following:
  • <SYSTEM32>\wbem\wmiadap.exe /R /T
Injects code into
the following system processes:
  • <SYSTEM32>\drwtsn32.exe
a large number of user processes.
Terminates or attempts to terminate
a large number of user processes.
Modifies file system :
Creates the following files:
  • %TEMP%\~TM1.tmp
  • %TEMP%\~TM2.tmp
  • %PROGRAM_FILES%\Internet Explorer\dmlconf.dat
  • %TEMP%\43257.dmp
Sets the 'hidden' attribute to the following files:
  • %HOMEPATH%\Start Menu\Programs\Startup\mhrhcrji.exe
Deletes the following files:
  • %TEMP%\~TM1.tmp
  • %TEMP%\~TM2.tmp
  • %TEMP%\d9c6_appcompat.txt
  • %TEMP%\ed14_appcompat.txt
  • %TEMP%\2d3e_appcompat.txt
  • %TEMP%\249b_appcompat.txt
  • %TEMP%\3d37_appcompat.txt
  • %TEMP%\3b2b_appcompat.txt
  • %TEMP%\31c5_appcompat.txt
Network activity:
Connects to:
  • '74.##5.232.51':80
UDP:
  • DNS ASK za###ng.name
  • DNS ASK google.com
  • DNS ASK ty#####tjfyvetscev.com