Per il corretto funzionamento del sito, è necessario attivare il supporto di JavaScript nel browser.
Win32.HLLW.Ridnu.10
Aggiunto al database dei virus Dr.Web:
2013-04-08
La descrizione è stata aggiunta:
2013-04-17
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Shell' = 'explorer.exe "C:\explorer.exe"'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'kxyqzalsq.exe' = '%HOMEPATH%\Local Settings\kxyqzalsq.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe, C:\explorer.exe'
[<HKCU>\Control Panel\Desktop] 'SCRNSAVE.EXE' = 'MR_COO~1.SCR'
[<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'thid' = 'odkq.exe'
Creates or modifies the following files:
%HOMEPATH%\Start Menu\Programs\Startup\winlogon.exe
Infects the following executable system files:
<SYSTEM32>\dllcache\psapi.dll
<SYSTEM32>\msvbvm60.dll
Creates the following files on removable media:
<Drive name for removable media>:\Mr_CF\Folder.htt
<Drive name for removable media>:\Desktop.ini
<Drive name for removable media>:\Mr_CF\Mr_CF.exe
<Drive name for removable media>:\Mr_CoolFace.scr
<Drive name for removable media>:\Autorun.inf
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
hidden files
file extensions
blocks the following features:
Creates and executes the following:
%HOMEPATH%\Local Settings\kxyqzalsq.exe
%TEMP%\inf4D2.tmp
Executes the following:
Terminates or attempts to terminate
the following system processes:
Modifies file system :
Creates the following files:
%APPDATA%\SMA Negeri 1 Pangkalpinang.exe
%APPDATA%\Mutant.exe
%APPDATA%\Sahang.exe
%WINDIR%\Negeri Serumpun Sebalai .pif .bat .com .scr .exe
%APPDATA%\explorer.exe
%APPDATA%\Mr_CoolFace.exe
%APPDATA%\Timah.exe
C:\explorer.exe
%HOMEPATH%\Local Settings\Mr_CF_Mutation.Excalibur
%HOMEPATH%\Local Settings\kxyqzalsq.exe
<LS_APPDATA>\Polymorph1.exe
<LS_APPDATA>\Polymorph2.exe
<SYSTEM32>\Mr_CoolFace.scr
%APPDATA%\Autorun.inf
%APPDATA%\Mr_CF\Folder.htt
%APPDATA%\Mr_CF\Desktop.ini
%TEMP%\inf4D2.tmp
%HOMEPATH%\Desktop\Message For My Princess.txt
%HOMEPATH%\Desktop\Message For My Princess.scr
C:\Mr_CoolFace.scr
C:\Desktop.ini
%HOMEPATH%\Local Settings\DNALSI_AKGNAB.exe
<SYSTEM32>\odkq.exe
C:\Autorun.inf
C:\Mr_CF\Mr_CF.exe
C:\Mr_CF\Folder.htt
Sets the 'hidden' attribute to the following files:
<Drive name for removable media>:\Mr_CF\Folder.htt
<Drive name for removable media>:\Desktop.ini
<SYSTEM32>\odkq.exe
C:\explorer.exe
<SYSTEM32>\Mr_CoolFace.scr
<Drive name for removable media>:\Mr_CoolFace.scr
C:\Mr_CoolFace.scr
C:\Autorun.inf
C:\Desktop.ini
<Drive name for removable media>:\Autorun.inf
C:\Mr_CF\Folder.htt
Moves the following system files:
from <SYSTEM32>\psapi.dll to <SYSTEM32>gnutileBakgnaB.ipasp
Miscellaneous:
Searches for the following windows:
ClassName: 'Proxy Desktop' WindowName: ''
ClassName: 'BaseBar' WindowName: 'ChanApp'
ClassName: '' WindowName: 'Zanda'
ClassName: '' WindowName: ''
ClassName: 'SysListView32' WindowName: ''
ClassName: 'CSCHiddenWindow' WindowName: ''
ClassName: 'Indicator' WindowName: ''
ClassName: 'OleMainThreadWndClass' WindowName: ''
ClassName: 'SystemTray_Main' WindowName: ''
ClassName: '' WindowName: 'Process Explorer'
ClassName: '' WindowName: '` `'
ClassName: '' WindowName: 'Multikiller'
ClassName: '' WindowName: 'Windows Task Manager'
ClassName: 'Shell_TrayWnd' WindowName: ''
ClassName: '' WindowName: 'Multikiller2'
ClassName: '' WindowName: 'System Restore'
ClassName: '' WindowName: 'Process Viewer'
ClassName: '' WindowName: 'Registry Editor'
ClassName: '' WindowName: 'System Configuration Utility'
Scaricate Dr.Web per Android
Gratis per 3 mesi
Tutti i componenti di protezione
Rinnovo versione di prova tramite AppGallery/Google Pay
Continuando a utilizzare questo sito, l'utente acconsente al nostro utilizzo di file Cookie e di altre tecnologie per la raccolta di informazioni statistiche sui visitatori. Per maggiori informazioni
OK