マイライブラリ
マイライブラリ

+ マイライブラリに追加

電話

お問い合わせ履歴

電話(英語)

+7 (495) 789-45-86

Profile

Win32.HLLW.Autoruner.53633

Added to the Dr.Web virus database: 2011-07-08

Virus description added:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Shell32' = '"<SYSTEM32>\Shell32.exe"'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Kernl32' = '"%WINDIR%\Kernl32.exe"'
Creates the following files on removable media:
  • <Drive name for removable media>:\autorun.inf
  • <Drive name for removable media>:\ADRY-Z.exe
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
  • hidden files
  • file extensions
blocks execution of the following system utilities:
  • Registry Editor (RegEdit)
Executes the following:
  • <SYSTEM32>\rundll32.exe shell32.dll,Activate_RunDLL
Modifies settings of Windows Explorer:
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoFolderOptions' = '00000001'
Modifies file system :
Creates the following files:
  • C:\Windos.exe
  • %HOMEPATH%\Desktop\Nokia 3gp.exe
  • C:\Program File.exe
  • %WINDIR%\Default.htm
  • %WINDIR%\aku.txt
  • %HOMEPATH%\Desktop\Kata-kata Mutiara.exe
  • %WINDIR%\Kernl32.exe
  • %WINDIR%\Autorun.inf
  • <SYSTEM32>\Shell32.exe
  • %HOMEPATH%\My Documents\Gadis Manies.exe
  • %HOMEPATH%\My Documents\Nokia 3gp.exe
Sets the 'hidden' attribute to the following files:
  • <Drive name for removable media>:\autorun.inf
  • <Drive name for removable media>:\ADRY-Z.exe
Miscellaneous:
Searches for the following windows:
  • ClassName: 'spider' WindowName: ''
  • ClassName: 'freewclass' WindowName: ''
  • ClassName: '' WindowName: 'The Microsoft Hearts Network'
  • ClassName: 'minesweeper' WindowName: ''
  • ClassName: 'Shell_TrayWnd' WindowName: ''
  • ClassName: 'Indicator' WindowName: ''
  • ClassName: 'Solitaire' WindowName: ''
  • ClassName: '' WindowName: 'Windows Task Manager'