Per il corretto funzionamento del sito, è necessario attivare il supporto di JavaScript nel browser.
Win32.HLLW.Ridnu.6
Aggiunto al database dei virus Dr.Web:
2012-06-22
La descrizione è stata aggiunta:
2012-07-13
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
[<HKLM>\SOFTWARE\Classes\piffile\shell\open\command] '' = '"C:\explorer.exe" "%1" %*'
[<HKLM>\SOFTWARE\Classes\batfile\shell\open\command] '' = '"C:\explorer.exe" "%1" %*'
[<HKLM>\SOFTWARE\Classes\comfile\shell\open\command] '' = '"C:\explorer.exe" "%1" %*'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Paradiso_Perduto' = 'SMUNSA_PANGKALPINANG_BANGKA'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Penylethylamine' = '<LS_APPDATA>\Emma.exe'
[<HKLM>\SOFTWARE\Classes\VBSFile\Shell\Open\Command] '' = '"C:\explorer.exe" "%1" %*'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Shell' = 'explorer.exe "C:\explorer.exe"'
[<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'WindowsSecurityService' = '%WINDIR%\services.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'SysLockedNT' = 'smss.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Alumni_Smoensa_Pangkalpinang' = 'Mr_CoolFace'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe, C:\explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'q' = 'h.exe'
[<HKCU>\Control Panel\Desktop] 'SCRNSAVE.EXE' = 'MR_COO~1.SCR'
Creates or modifies the following files:
%HOMEPATH%\Start Menu\Programs\Startup\winlogon.exe
%WINDIR%\Tasks\At2.job
%WINDIR%\Tasks\At1.job
Infects the following executable system files:
Creates the following files on removable media:
<Drive name for removable media>:\Renova.htt
<Drive name for removable media>:\Desktop.ini
<Drive name for removable media>:\My_Wallpaper.exe
<Drive name for removable media>:\Penylethylamine.scr
<Drive name for removable media>:\Autorun.inf
<Drive name for removable media>:\Xenova.scr
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
hidden files
file extensions
blocks the following features:
Creates and executes the following:
%HOMEPATH%\Local Settings\ywn.exe
<LS_APPDATA>\Alisa.exe
<LS_APPDATA>\Emma.exe
%PROGRAM_FILES%\services.exe
Executes the following:
<SYSTEM32>\at.exe 17:17 /every:Sunday,Monday,Tuesday,Wednesday,Thursday,Friday,Saturday "PENYLETHLAM1NE.SCR"
%WINDIR%\explorer.exe
<SYSTEM32>\at.exe 11:11 /every:Sunday,Monday,Tuesday,Wednesday,Thursday,Friday,Saturday "1MAG1NARY_NUMBER.EXE"
<SYSTEM32>\at.exe 22:22 /every:Sunday,Monday,Tuesday,Wednesday,Thursday,Friday,Saturday "PARAD1S0_PERDUT0.PIF"
Terminates or attempts to terminate
the following system processes:
Modifies settings of Windows Explorer:
[<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer] 'NoFind' = '00000001'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoFind' = '00000001'
Modifies file system :
Creates the following files:
%APPDATA%\SMA Negeri 1 Pangkalpinang.exe
%APPDATA%\Mr_CoolFace.exe
%APPDATA%\Mutant.exe
%APPDATA%\Timah.exe
%APPDATA%\Sahang.exe
%APPDATA%\explorer.exe
<SYSTEM32>\Matter_Irradiation_Dissociative_Acceleration_System.M.I.D.A.S
<SYSTEM32>\PENYLETHLAM1NE.SCR
%HOMEPATH%\Local Settings\AKGNAB_UALUP.exe
%WINDIR%\Negeri Serumpun Sebalai .pif .bat .com .scr .exe
<SYSTEM32>\h.exe
<LS_APPDATA>\Polymorph1.exe
%HOMEPATH%\Local Settings\Mr_CF_Mutation.SaveTheQueen
%HOMEPATH%\Local Settings\AKGNAB_UALUP.exe.FrontMission3
%HOMEPATH%\Local Settings\ywn.exe
%APPDATA%\Renova.ini
%APPDATA%\Renova.htt
%PROGRAM_FILES%\services.exe
<SYSTEM32>\Mr_CoolFace.scr
<LS_APPDATA>\Polymorph2.exe
C:\explorer.exe
<LS_APPDATA>\Alisa.exe
<LS_APPDATA>\Emma.exe
<SYSTEM32>\PARAD1S0_PERDUT0.PIF
%APPDATA%\Mr_CoolFace_TwinAngels_Emma_Alisa.inf
%PROGRAM_FILES%\I_Miss_U_MyPrincess.scr
%PROGRAM_FILES%\Your_Prince_Will_Be_Waiting_For_You.scr
%CommonProgramFiles%\Emira.Emma
%PROGRAM_FILES%\May be Smansa was wonderful place to us.scr
%PROGRAM_FILES%\Hanya Pesan Untuknya.exe
%TEMP%\inf4D2.tmp
%WINDIR%\services.exe
%HOMEPATH%\Desktop\Message For My Princess.txt
%PROGRAM_FILES%\Irma Triana.scr
%HOMEPATH%\Desktop\Message For My Princess.scr
%CommonProgramFiles%\Aliciana.Alisa
C:\Xenova.scr
C:\Autorun.inf
C:\Renova.htt
<SYSTEM32>\1MAG1NARY_NUMBER.EXE
C:\Desktop.ini
C:\Penylethylamine.scr
%APPDATA%\Mr_CF\Renova_Join_Mr_CoolFace.htt
%PROGRAM_FILES%\PC_MAV.EXE
%APPDATA%\Mr_CF\Emira_N_Aliciana_IsBack.ini
%HOMEPATH%\My Documents\JUST LINK\Information.rtf
%APPDATA%\Mr_CF\The_Link.rtf
Sets the 'hidden' attribute to the following files:
<Drive name for removable media>:\Renova.htt
<Drive name for removable media>:\Desktop.ini
<Drive name for removable media>:\Xenova.scr
<SYSTEM32>\h.exe
%PROGRAM_FILES%\services.exe
C:\explorer.exe
<SYSTEM32>\Mr_CoolFace.scr
<Drive name for removable media>:\Penylethylamine.scr
C:\Penylethylamine.scr
C:\Autorun.inf
%HOMEPATH%\Desktop\Message For My Princess.txt
C:\Xenova.scr
<Drive name for removable media>:\Autorun.inf
C:\Renova.htt
C:\Desktop.ini
Miscellaneous:
Searches for the following windows:
ClassName: 'BaseBar' WindowName: 'ChanApp'
ClassName: 'SysListView32' WindowName: ''
ClassName: 'Proxy Desktop' WindowName: ''
ClassName: 'Shell_TrayWnd' WindowName: ''
ClassName: 'OleMainThreadWndClass' WindowName: ''
ClassName: 'Indicator' WindowName: ''
ClassName: 'Button' WindowName: 'Start'
ClassName: 'SystemTray_Main' WindowName: ''
ClassName: 'CSCHiddenWindow' WindowName: ''
ClassName: '' WindowName: 'Multikiller2'
ClassName: '' WindowName: 'Registry Editor'
ClassName: '' WindowName: '` `'
ClassName: '' WindowName: 'Multikiller'
ClassName: '' WindowName: 'System Configuration Utility'
ClassName: '' WindowName: 'Process Explorer'
ClassName: '' WindowName: 'Zanda'
ClassName: '' WindowName: 'System Restore'
ClassName: '' WindowName: 'Process Viewer'
Scaricate Dr.Web per Android
Gratis per 3 mesi
Tutti i componenti di protezione
Rinnovo versione di prova tramite AppGallery/Google Pay
Continuando a utilizzare questo sito, l'utente acconsente al nostro utilizzo di file Cookie e di altre tecnologie per la raccolta di informazioni statistiche sui visitatori. Per maggiori informazioni
OK