To complicate detection of its presence in the operating system,
forces the system hide from view:
- hidden files
- file extensions
blocks execution of the following system utilities:
- Windows Task Manager (Taskmgr)
- Registry Editor (RegEdit)
blocks the following features:
Creates and executes the following:
- %ALLUSERSPROFILE%\Application Data\windows-update.exe (downloaded from the Internet)
Executes the following:
- <SYSTEM32>\net1.exe stop "Windows Firewall/Internet Connection Sharing (ICS)"
- <SYSTEM32>\at.exe /delete /yes
- <SYSTEM32>\at.exe 12:00 /interactive /EVERY:m,t,w,th,f,s,su <SYSTEM32>\iexplorer.exe
- <SYSTEM32>\net.exe stop "Security Center"
- <SYSTEM32>\net1.exe stop "Security Center"
- <SYSTEM32>\net.exe stop "Windows Firewall/Internet Connection Sharing (ICS)"
Searches for registry branches where third party applications store passwords:
- [<HKCU>\Software\Yahoo\pager]
Modifies settings of Windows Explorer:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoRun' = '00000001'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoFind' = '00000001'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer] 'NoFolderOptions' = '00000001'
Modifies settings of Windows Internet Explorer:
- [<HKCU>\Software\Microsoft\Internet Explorer\Main] 'Window Title' = 'Allahou Akbar'
Forces autoplay for removable media.
Sets a new unauthorized home page for Windows Internet Explorer.