マイライブラリ
マイライブラリ

+ マイライブラリに追加

電話

お問い合わせ履歴

電話(英語)

+7 (495) 789-45-86

Profile

Win32.HLLW.Autoruner2.19074

Added to the Dr.Web virus database: 2015-01-25

Virus description added:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices] 'Lisa' = '%WINDIR%\netsfigx.exe'
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Bsqx' = '%WINDIR%\ Addins\netsfigx.exe'
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Bsqxita' = '<SYSTEM32>\Bsqxita.exe'
Creates the following files on removable media:
  • <Drive name for removable media>:\Bsqx\Desktop.ini
  • <Drive name for removable media>:\Autorun.inf
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
  • hidden files
Executes the following:
  • '<SYSTEM32>\wbem\wmiadap.exe' /R /T
Modifies file system :
Creates the following files:
  • C:\System Volume Information\_restore{E7F0F64C-F7E5-4319-8757-E9A20C1C4E14}\fifo.log
  • C:\System Volume Information\_restore{E7F0F64C-F7E5-4319-8757-E9A20C1C4E14}\RP15\RestorePointSize
  • \Device\LanmanRedirector\CRNJEUFU*\MAILSLOT\NET\NETLOGON
Sets the 'hidden' attribute to the following files:
  • <Drive name for removable media>:\Bsqx\Desktop.ini
  • <Drive name for removable media>:\Autorun.inf
Deletes the following files:
  • <SYSTEM32>\wbem\Performance\WmiApRpl.ini
  • <SYSTEM32>\PerfStringBackup.TMP
  • <SYSTEM32>\cmd.exe
  • %WINDIR%\pchealth\helpctr\binaries\msconfig.exe
  • <SYSTEM32>\logonui.exe