My Bitdefender
  • 0 Shopping Cart


Facebook Twitter Google Plus




presence of autorun.inf and {UserName}.vbs on all drives
unable to start: taskmgr.exe, regedit.exe, msconfig.exe, cmd.exe
presence of a .ini file: %systemroot%\system32\{UserName}.ini
and %systemroot%\system32\{UserName}.vbs

Removal instructions:

Please let BitDefender disinfect your files.

Analyzed By

Lita Catalin, virus researcher

Technical Description:

on first run
it generates a new code form of his own in which functions are randomly located in file
then copies itself in %systemroot%\system32\{UserName}.vbs

and starts to infect files with .hta .html .htm .asp and .vbs extension
infected files will contain the virus body at the beginning of them
anytime an infected file will be opened virus will run too
virus will infect up to 1000 files of a maximum size of 350000 bytes

it modifies registry values:

sets value of  "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load"
        to {path to .vbs}
  where {path to .vbs} is "%systemroot%\system32\{UserName}.vbs
   and {UserName} is the name of the username from the infected computer

sets values of "HKLM\Software\Classes\txtfile\shell\open\command\{Default}"
to "%systemroot%\system32\wscript.exe {path to .vbs} %1 %*"
all those to be sure will get executed most of the time

sets value of "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun"
to 0x81
and value of
to 0 hiding his files from user by disabling viewing files with hidden attribute

searches for any local or removable drive to copy there two files:
a copy of itself as {UserName}.vbs
and autorun.inf

it will periodicly check if any of the following processes is running:
ras.exe , 360tray.exe, taskmgr.exe, cmd.exe,, regedit.exe, regedit.scr, regedit.pif,, msconfig.exe, SREng.exe, USBAntiVir.exe
and if it finds any will try to kill it

it also checks for filenames containing predefined strings related to adult videos to delete them as a payload; those file extension are: .mpg, .rmvb, .avi, .rm