Win32.HLLW.Ridnu.6
Added to the Dr.Web virus database:
2012-06-22
Virus description added:
2012-07-13
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Classes\piffile\shell\open\command] '' = '"C:\explorer.exe" "%1" %*'
- [<HKLM>\SOFTWARE\Classes\batfile\shell\open\command] '' = '"C:\explorer.exe" "%1" %*'
- [<HKLM>\SOFTWARE\Classes\comfile\shell\open\command] '' = '"C:\explorer.exe" "%1" %*'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Paradiso_Perduto' = 'SMUNSA_PANGKALPINANG_BANGKA'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Penylethylamine' = '<LS_APPDATA>\Emma.exe'
- [<HKLM>\SOFTWARE\Classes\VBSFile\Shell\Open\Command] '' = '"C:\explorer.exe" "%1" %*'
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Shell' = 'explorer.exe "C:\explorer.exe"'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'WindowsSecurityService' = '%WINDIR%\services.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'SysLockedNT' = 'smss.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Alumni_Smoensa_Pangkalpinang' = 'Mr_CoolFace'
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe, C:\explorer.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'q' = 'h.exe'
- [<HKCU>\Control Panel\Desktop] 'SCRNSAVE.EXE' = 'MR_COO~1.SCR'
Creates or modifies the following files:
- %HOMEPATH%\Start Menu\Programs\Startup\winlogon.exe
- %WINDIR%\Tasks\At2.job
- %WINDIR%\Tasks\At1.job
Infects the following executable system files:
Creates the following files on removable media:
- <Drive name for removable media>:\Renova.htt
- <Drive name for removable media>:\Desktop.ini
- <Drive name for removable media>:\My_Wallpaper.exe
- <Drive name for removable media>:\Penylethylamine.scr
- <Drive name for removable media>:\Autorun.inf
- <Drive name for removable media>:\Xenova.scr
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
- hidden files
- file extensions
blocks the following features:
Creates and executes the following:
- %HOMEPATH%\Local Settings\ywn.exe
- <LS_APPDATA>\Alisa.exe
- <LS_APPDATA>\Emma.exe
- %PROGRAM_FILES%\services.exe
Executes the following:
- <SYSTEM32>\at.exe 17:17 /every:Sunday,Monday,Tuesday,Wednesday,Thursday,Friday,Saturday "PENYLETHLAM1NE.SCR"
- %WINDIR%\explorer.exe
- <SYSTEM32>\at.exe 11:11 /every:Sunday,Monday,Tuesday,Wednesday,Thursday,Friday,Saturday "1MAG1NARY_NUMBER.EXE"
- <SYSTEM32>\at.exe 22:22 /every:Sunday,Monday,Tuesday,Wednesday,Thursday,Friday,Saturday "PARAD1S0_PERDUT0.PIF"
Terminates or attempts to terminate
the following system processes:
Modifies settings of Windows Explorer:
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer] 'NoFind' = '00000001'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoFind' = '00000001'
Modifies file system :
Creates the following files:
- %APPDATA%\SMA Negeri 1 Pangkalpinang.exe
- %APPDATA%\Mr_CoolFace.exe
- %APPDATA%\Mutant.exe
- %APPDATA%\Timah.exe
- %APPDATA%\Sahang.exe
- %APPDATA%\explorer.exe
- <SYSTEM32>\Matter_Irradiation_Dissociative_Acceleration_System.M.I.D.A.S
- <SYSTEM32>\PENYLETHLAM1NE.SCR
- %HOMEPATH%\Local Settings\AKGNAB_UALUP.exe
- %WINDIR%\Negeri Serumpun Sebalai .pif .bat .com .scr .exe
- <SYSTEM32>\h.exe
- <LS_APPDATA>\Polymorph1.exe
- %HOMEPATH%\Local Settings\Mr_CF_Mutation.SaveTheQueen
- %HOMEPATH%\Local Settings\AKGNAB_UALUP.exe.FrontMission3
- %HOMEPATH%\Local Settings\ywn.exe
- %APPDATA%\Renova.ini
- %APPDATA%\Renova.htt
- %PROGRAM_FILES%\services.exe
- <SYSTEM32>\Mr_CoolFace.scr
- <LS_APPDATA>\Polymorph2.exe
- C:\explorer.exe
- <LS_APPDATA>\Alisa.exe
- <LS_APPDATA>\Emma.exe
- <SYSTEM32>\PARAD1S0_PERDUT0.PIF
- %APPDATA%\Mr_CoolFace_TwinAngels_Emma_Alisa.inf
- %PROGRAM_FILES%\I_Miss_U_MyPrincess.scr
- %PROGRAM_FILES%\Your_Prince_Will_Be_Waiting_For_You.scr
- %CommonProgramFiles%\Emira.Emma
- %PROGRAM_FILES%\May be Smansa was wonderful place to us.scr
- %PROGRAM_FILES%\Hanya Pesan Untuknya.exe
- %TEMP%\inf4D2.tmp
- %WINDIR%\services.exe
- %HOMEPATH%\Desktop\Message For My Princess.txt
- %PROGRAM_FILES%\Irma Triana.scr
- %HOMEPATH%\Desktop\Message For My Princess.scr
- %CommonProgramFiles%\Aliciana.Alisa
- C:\Xenova.scr
- C:\Autorun.inf
- C:\Renova.htt
- <SYSTEM32>\1MAG1NARY_NUMBER.EXE
- C:\Desktop.ini
- C:\Penylethylamine.scr
- %APPDATA%\Mr_CF\Renova_Join_Mr_CoolFace.htt
- %PROGRAM_FILES%\PC_MAV.EXE
- %APPDATA%\Mr_CF\Emira_N_Aliciana_IsBack.ini
- %HOMEPATH%\My Documents\JUST LINK\Information.rtf
- %APPDATA%\Mr_CF\The_Link.rtf
Sets the 'hidden' attribute to the following files:
- <Drive name for removable media>:\Renova.htt
- <Drive name for removable media>:\Desktop.ini
- <Drive name for removable media>:\Xenova.scr
- <SYSTEM32>\h.exe
- %PROGRAM_FILES%\services.exe
- C:\explorer.exe
- <SYSTEM32>\Mr_CoolFace.scr
- <Drive name for removable media>:\Penylethylamine.scr
- C:\Penylethylamine.scr
- C:\Autorun.inf
- %HOMEPATH%\Desktop\Message For My Princess.txt
- C:\Xenova.scr
- <Drive name for removable media>:\Autorun.inf
- C:\Renova.htt
- C:\Desktop.ini
Miscellaneous:
Searches for the following windows:
- ClassName: 'BaseBar' WindowName: 'ChanApp'
- ClassName: 'SysListView32' WindowName: ''
- ClassName: 'Proxy Desktop' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'OleMainThreadWndClass' WindowName: ''
- ClassName: 'Indicator' WindowName: ''
- ClassName: 'Button' WindowName: 'Start'
- ClassName: 'SystemTray_Main' WindowName: ''
- ClassName: 'CSCHiddenWindow' WindowName: ''
- ClassName: '' WindowName: 'Multikiller2'
- ClassName: '' WindowName: 'Registry Editor'
- ClassName: '' WindowName: '` `'
- ClassName: '' WindowName: 'Multikiller'
- ClassName: '' WindowName: 'System Configuration Utility'
- ClassName: '' WindowName: 'Process Explorer'
- ClassName: '' WindowName: 'Zanda'
- ClassName: '' WindowName: 'System Restore'
- ClassName: '' WindowName: 'Process Viewer'
欢迎下载
Dr.Web for Android
-
免费3个月
-
可使用所有保护组件
-
可在AppGallery/Google Pay延期
继续使用此网站意味着您同意我们使用Cookie文件和其他用于收集网站访问统计信息的技术手段。详细信息