Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Win32.HLLW.Autoruner2.15621

Added to the Dr.Web virus database: 2014-06-16

Virus description added:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Shell' = 'explorer.exe, maxkiller.exe'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Runonce' = '%WINDIR%\okmysadheok.exe'
Creates or modifies the following files:
  • %HOMEPATH%\Start Menu\Programs\Startup\201092978868.exe
  • %HOMEPATH%\Start Menu\Programs\Startup\mmsn.exe
  • %HOMEPATH%\Start Menu\Programs\Startup\201092978867.exe
  • %HOMEPATH%\Start Menu\Programs\Startup\201092978865.exe
  • %HOMEPATH%\Start Menu\Programs\Startup\201092978866.exe
Creates the following files on removable media:
  • <Drive name for removable media>:\New Folder (2).exe
  • <Drive name for removable media>:\New Folder.exe
  • <Drive name for removable media>:\autorun.inf
  • <Drive name for removable media>:\okmysadheok.exe
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
  • hidden files
Creates and executes the following:
  • '%HOMEPATH%\Start Menu\Programs\Startup\201092978866.exe'
  • '%HOMEPATH%\Start Menu\Programs\Startup\201092978865.exe'
Executes the following:
  • '<SYSTEM32>\wbem\wmiadap.exe' /R /T
Terminates or attempts to terminate
the following system processes:
  • <SYSTEM32>\cscript.exe
Modifies file system :
Creates the following files:
  • %WINDIR%\YahooMessenger.exe
  • %TEMP%\aut7.tmp
  • %WINDIR%\okmysadheok.exe
  • %WINDIR%\maxkiller.exe
  • %TEMP%\ygrqlbg
  • C:\New Folder (2).exe
  • C:\New Folder.exe
  • C:\autorun.inf
  • C:\okmysadheok.exe
  • %TEMP%\aut2.tmp
  • %TEMP%\aut3.tmp
  • %TEMP%\aut1.tmp
  • %TEMP%\bvkzklf
  • %TEMP%\aut4.tmp
  • %TEMP%\aut6.tmp
  • %TEMP%\csoxfqw
  • %TEMP%\aut5.tmp
  • %WINDIR%\autorun.inf
Sets the 'hidden' attribute to the following files:
  • C:\okmysadheok.exe
  • <Drive name for removable media>:\autorun.inf
  • <Drive name for removable media>:\okmysadheok.exe
  • C:\autorun.inf
  • %WINDIR%\maxkiller.exe
  • %WINDIR%\okmysadheok.exe
  • %WINDIR%\autorun.inf
Deletes the following files:
  • %TEMP%\ygrqlbg
  • %TEMP%\aut7.tmp
  • %TEMP%\csoxfqw
  • C:\autorun.inf
  • <SYSTEM32>\PerfStringBackup.TMP
  • <SYSTEM32>\wbem\Performance\WmiApRpl.ini
  • <Drive name for removable media>:\autorun.inf
  • %TEMP%\aut2.tmp
  • %TEMP%\bvkzklf
  • %TEMP%\aut1.tmp
  • %TEMP%\aut3.tmp
  • %TEMP%\aut6.tmp
  • %TEMP%\aut5.tmp
  • %TEMP%\aut4.tmp
Miscellaneous:
Searches for the following windows:
  • ClassName: 'Indicator' WindowName: '(null)'
  • ClassName: 'Shell_TrayWnd' WindowName: '(null)'