Per il corretto funzionamento del sito, è necessario attivare il supporto di JavaScript nel browser.
Win32.HLLW.Ridnu.5
Aggiunto al database dei virus Dr.Web:
2012-06-22
La descrizione è stata aggiunta:
2012-07-13
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Shell' = 'explorer.exe "C:\explorer.exe"'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'gspgguweh.exe' = '%HOMEPATH%\Local Settings\gspgguweh.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe, C:\explorer.exe'
[<HKCU>\Control Panel\Desktop] 'SCRNSAVE.EXE' = 'MR_COO~1.SCR'
[<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'wtgelx' = 'rubwva.exe'
Creates or modifies the following files:
%HOMEPATH%\Start Menu\Programs\Startup\winlogon.exe
Infects the following executable system files:
Creates the following files on removable media:
<Drive name for removable media>:\Mr_CF\Folder.htt
<Drive name for removable media>:\Desktop.ini
<Drive name for removable media>:\Mr_CF\Mr_CF.exe
<Drive name for removable media>:\Mr_CoolFace.scr
<Drive name for removable media>:\Autorun.inf
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
hidden files
file extensions
blocks the following features:
Creates and executes the following:
%HOMEPATH%\Local Settings\gspgguweh.exe
%TEMP%\inf4D2.tmp
Executes the following:
Terminates or attempts to terminate
the following system processes:
Modifies file system :
Creates the following files:
%APPDATA%\Mutant.exe
%APPDATA%\Sahang.exe
%APPDATA%\Timah.exe
%APPDATA%\explorer.exe
%APPDATA%\Mr_CoolFace.exe
%APPDATA%\SMA Negeri 1 Pangkalpinang.exe
<LS_APPDATA>\Polymorph1.exe
%HOMEPATH%\Local Settings\DNALSI_AKGNAB.exe.mutant
%HOMEPATH%\Local Settings\Mr_CF_Mutation.Excalibur
%HOMEPATH%\Local Settings\gspgguweh.exe
<LS_APPDATA>\Polymorph2.exe
<SYSTEM32>\Mr_CoolFace.scr
C:\explorer.exe
%WINDIR%\Negeri Serumpun Sebalai .pif .bat .com .scr .exe
%APPDATA%\Autorun.inf
%APPDATA%\Mr_CF\Folder.htt
%APPDATA%\Mr_CF\Desktop.ini
%TEMP%\inf4D2.tmp
%HOMEPATH%\Desktop\Message For My Princess.txt
%HOMEPATH%\Desktop\Message For My Princess.scr
C:\Mr_CoolFace.scr
C:\Desktop.ini
%HOMEPATH%\Local Settings\DNALSI_AKGNAB.exe
<SYSTEM32>\rubwva.exe
C:\Autorun.inf
C:\Mr_CF\Mr_CF.exe
C:\Mr_CF\Folder.htt
Sets the 'hidden' attribute to the following files:
<Drive name for removable media>:\Mr_CF\Folder.htt
<Drive name for removable media>:\Desktop.ini
<SYSTEM32>\rubwva.exe
C:\explorer.exe
<SYSTEM32>\Mr_CoolFace.scr
<Drive name for removable media>:\Mr_CoolFace.scr
C:\Mr_CoolFace.scr
C:\Autorun.inf
C:\Desktop.ini
<Drive name for removable media>:\Autorun.inf
C:\Mr_CF\Folder.htt
Miscellaneous:
Searches for the following windows:
ClassName: 'BaseBar' WindowName: 'ChanApp'
ClassName: 'SysListView32' WindowName: ''
ClassName: '' WindowName: 'Zanda'
ClassName: 'Proxy Desktop' WindowName: ''
ClassName: 'CSCHiddenWindow' WindowName: ''
ClassName: 'Indicator' WindowName: ''
ClassName: 'OleMainThreadWndClass' WindowName: ''
ClassName: 'SystemTray_Main' WindowName: ''
ClassName: '' WindowName: 'Process Explorer'
ClassName: '' WindowName: 'Multikiller'
ClassName: '' WindowName: 'Multikiller2'
ClassName: 'Shell_TrayWnd' WindowName: ''
ClassName: '' WindowName: '` `'
ClassName: '' WindowName: 'System Restore'
ClassName: '' WindowName: 'Process Viewer'
ClassName: '' WindowName: 'Registry Editor'
ClassName: '' WindowName: 'System Configuration Utility'
Scaricate Dr.Web per Android
Gratis per 3 mesi
Tutti i componenti di protezione
Rinnovo versione di prova tramite AppGallery/Google Pay
Continuando a utilizzare questo sito, l'utente acconsente al nostro utilizzo di file Cookie e di altre tecnologie per la raccolta di informazioni statistiche sui visitatori. Per maggiori informazioni
OK