Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Win32.HLLW.Autoruner1.26562

Added to the Dr.Web virus database: 2012-09-22

Virus description added:

Technical Information

To ensure autorun and distribution:
Creates the following files on removable media:
  • <Drive name for removable media>:\autorun.inf
  • <Drive name for removable media>:\Real.exe
Malicious functions:
Creates and executes the following:
  • %TEMP%\Real.exe
  • %TEMP%\utorrent.exe
Executes the following:
  • <SYSTEM32>\regsvr32.exe mswinsck.ocx /s
Modifies file system :
Creates the following files:
  • %APPDATA%\Microsoft\Protect\S-1-5-21-2052111302-484763869-725345543-1003\Preferred
  • %APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2052111302-484763869-725345543-1003\ec702f375e1b12d218f67ab9ef19ca23_23ef5514-3059-436f-a4a7-4cefaab20eb1
  • %WINDIR%\Config\Real.exe
  • %APPDATA%\Microsoft\Protect\S-1-5-21-2052111302-484763869-725345543-1003\427ae693-1b63-4035-9482-8e802ce9b6f4
  • %TEMP%\utorrent.exe
  • %TEMP%\Real.exe
Sets the 'hidden' attribute to the following files:
  • <Drive name for removable media>:\Real.exe
  • %TEMP%\Real.exe
Network activity:
Connects to:
  • 'tw####r.sytes.net':3176
UDP:
  • DNS ASK tw####r.sytes.net
Miscellaneous:
Searches for the following windows:
  • ClassName: 'Shell_TrayWnd' WindowName: ''
  • ClassName: '?Torrent4823DF041B09' WindowName: ''