JavaScript support is required for our site to be fully operational in your browser.
Win32.HLLW.Autoruner.8390
Added to the Dr.Web virus database:
2012-12-28
Virus description added:
2013-01-07
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
[<HKLM>\SOFTWARE\Microsoft\Active Setup\Installed Components\{019174B5-5DB4-AD46-5A77-51E8D88B0970}] 'StubPath' = '<SYSTEM32>:winsock.exe'
Malicious functions:
Injects code into
the following system processes:
Searches for windows to
detect analytical utilities:
ClassName: '' WindowName: 'Process Monitor - Sysinternals: www.sysinternals.com'
ClassName: 'RegmonClass' WindowName: ''
ClassName: '' WindowName: 'Registry Monitor - Sysinternals: www.sysinternals.com'
ClassName: 'FilemonClass' WindowName: ''
ClassName: '' WindowName: 'File Monitor - Sysinternals: www.sysinternals.com'
ClassName: 'PROCMON_WINDOW_CLASS' WindowName: ''
Modifies file system :
Creates the following files:
Deletes itself.
Network activity:
Connects to:
'gz#.#ooo.com':5020
'<Private IP address>':5020
'localhost':5020
'gr####ndk.mooo.com':5020
UDP:
DNS ASK gz#.#ooo.com
DNS ASK gr####ndk.mooo.com
Miscellaneous:
Searches for the following windows:
ClassName: '18467-41' WindowName: ''
Download Dr.Web for Android
Free three-month trial
All protection features available
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more
OK