JavaScript support is required for our site to be fully operational in your browser. 
	
 
	
		
        
            
                
            Win32.HLLW.Autoruner1.56962 
    Added to the Dr.Web virus database:  
    2013-09-23 
    Virus description added:  
    2013-09-23 
    Technical Information  
    
    To ensure autorun and distribution:
        
        Modifies the following registry keys:
            
            
            [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'wuaclts.exe' = 'C:\swssetup\systems.exe' 
            [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'wuaclt.exe' = '%WINDIR%\14785\systems.exe' 
             
             
        Creates the following files on removable media:
            
            
            <Drive name for removable media>:\trabajo.exe 
            <Drive name for removable media>:\autorun.inf 
            <Drive name for removable media>:\System\systems.exe 
            <Drive name for removable media>:\MOXITA.EXE 
             
             
         
     
    
    Malicious functions:
        
        Executes the following:
            
            
            '<SYSTEM32>\attrib.exe' +S +H +R "I:\autorun.inf" 
            '<SYSTEM32>\attrib.exe' +S +H +R "J:\autorun.inf" 
            '<SYSTEM32>\attrib.exe' +S +H +R "G:\autorun.inf" 
            '<SYSTEM32>\attrib.exe' +S +H +R "H:\autorun.inf" 
            '<SYSTEM32>\reg.exe' ADD HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Windows /v ErrorMode /t REG_DWORD /d "2" /f 
            '<SYSTEM32>\ping.exe' 127.0.0.1 -n 40 
            '<SYSTEM32>\reg.exe' ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v wuaclt.exe /t REG_SZ /d "%WINDIR%\14785\systems.exe" /f 
            '<SYSTEM32>\reg.exe' ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v wuaclts.exe /t REG_SZ /d "C:\swssetup\systems.exe" /f 
            '<SYSTEM32>\attrib.exe' +S +H +R "G:\system" 
            '<SYSTEM32>\attrib.exe' +S +H +R "H:\system" 
            '<SYSTEM32>\attrib.exe' +S +H +R "E:\system" 
            '<SYSTEM32>\attrib.exe' +S +H +R "F:\system" 
            '<SYSTEM32>\attrib.exe' +S +H +R "E:\autorun.inf" 
            '<SYSTEM32>\attrib.exe' +S +H +R "F:\autorun.inf" 
            '<SYSTEM32>\attrib.exe' +S +H +R "I:\system" 
            '<SYSTEM32>\attrib.exe' +S +H +R "J:\system" 
             
             
         
     
    
    Modifies file system :
        
        Creates the following files:
            
            
            %WINDIR%\14785\WINUPDATE.DLL 
            %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\f195d7b8.any[1] 
            C:\swssetup\systems.exe 
            %TEMP%\~1.bat 
            %WINDIR%\14785\systems.exe 
             
             
        Sets the 'hidden' attribute to the following  files:
            
            
            <Drive name for removable media>:\autorun.inf 
            %TEMP%\~1.bat 
             
             
         
     
    
    Network activity:
        
        Connects to:
            
            
            'f1###7b8.any.gs':80 
            'localhost':1036 
             
             
        TCP:
            
        UDP:
            
         
     
    
    Miscellaneous:
        
        Searches for the following windows:
            
            
            ClassName: 'IEFrame' WindowName: '(null)' 
            ClassName: 'MS_AutodialMonitor' WindowName: '(null)' 
            ClassName: 'MS_WebcheckMonitor' WindowName: '(null)' 
            ClassName: 'Indicator' WindowName: '(null)' 
            ClassName: '' WindowName: '(null)' 
            ClassName: 'Shell_TrayWnd' WindowName: '(null)' 
             
             
         
     
  
                 
             
            
                
            
        
    
	
 
			
		 
				
	
  
    
      
        Download  Dr.Web for Android
       
      
         
       
    
    
      
        Free three-month trial 
       
      
        All protection features available
       
      
        Renew your trial license in AppGallery/on Google Pay 
       
     
   
 
  
  
  
    
      By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more 
      
        
          
            
              OK