JavaScript support is required for our site to be fully operational in your browser.
Win32.HLLM.Reset.420
Added to the Dr.Web virus database:
2013-03-18
Virus description added:
2013-03-18
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\reset6] 'DLLName' = 'mswshl.dll'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\reset6] 'Logon' = 'Logon'
Malicious functions:
Creates and executes the following:
Executes the following:
Injects code into
the following system processes:
Installs hooks to intercept notifications
on keystrokes:
Handler for all processes: <SYSTEM32>\AUHook.dll
Searches for registry branches where third party applications store passwords:
[<HKLM>\Software\Ghisler\Windows Commander]
[<HKCU>\Software\Ghisler\Total Commander]
[<HKCU>\SOFTWARE\Far\Plugins\FTP\Hosts]
[<HKLM>\Software\Ghisler\Total Commander]
[<HKLM>\SOFTWARE\Miranda]
[<HKCU>\SOFTWARE\Mirabilis\ICQ\NewOwners]
[<HKCU>\Software\Ghisler\Windows Commander]
[<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Trillian]
Modifies file system :
Creates the following files:
<SYSTEM32>\AUHook.dll
<SYSTEM32>\mdmi386.exe
Network activity:
Connects to:
'www.vi####hecker.com':80
UDP:
DNS ASK www.vi####hecker.com
Download Dr.Web for Android
Free three-month trial
All protection features available
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more
OK