JavaScript support is required for our site to be fully operational in your browser.
Win32.HLLW.Ridnu.12
Added to the Dr.Web virus database:
2014-10-20
Virus description added:
2014-11-01
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RuLaunch.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\McEPOC.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsstat.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avsynmgr.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV-RTP.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VB6.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cureit.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV-CLN.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vShwin32.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgcc.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgupsvc.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgwb.dat] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgemc.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\McShield.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Avconsol.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgamsvr.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsMain.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sol.exe] 'Debugger' = '%CommonProgramFiles%\kartu.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wmplayer.exe] 'Debugger' = '%CommonProgramFiles%\kartu.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe] 'Debugger' = '%CommonProgramFiles%\reged1t.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe] 'Debugger' = '%CommonProgramFiles%\msconf1g.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\spider.exe] 'Debugger' = '%CommonProgramFiles%\Laba_Laba.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\IEXPLORE.EXE] 'Debugger' = '%CommonProgramFiles%\1EXPL0RE.EXE'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mplayer2.exe] 'Debugger' = '%CommonProgramFiles%\kalkulator.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mplayerc.exe] 'Debugger' = '%CommonProgramFiles%\w1nm1ne.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe] 'Debugger' = '%CommonProgramFiles%\tskmgr.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshearts.exe] 'Debugger' = '%CommonProgramFiles%\msheart.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad.exe] 'Debugger' = '%CommonProgramFiles%\N0TEPAD.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\freecell.exe] 'Debugger' = '%CommonProgramFiles%\freecel.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winmine.exe] 'Debugger' = '%CommonProgramFiles%\w1nm1ne.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\calc.exe] 'Debugger' = '%CommonProgramFiles%\kalkulator.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wordpad.exe] 'Debugger' = '%CommonProgramFiles%\W0RDPAD.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mspaint.exe] 'Debugger' = '%CommonProgramFiles%\mspa1nt.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\xmplay.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Paradiso_Perduto' = 'SMUNSA_PANGKALPINANG_BANGKA'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nip.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Classes\VBSFile\Shell\Open\Command] '' = '"C:\explorer.exe" "%1" %*'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Penylethylamine' = '<LS_APPDATA>\Emma.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nvcsched.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nipsvc.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Zlh.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Zanda.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Classes\piffile\shell\open\command] '' = '"C:\explorer.exe" "%1" %*'
[<HKCU>\Control Panel\Desktop] 'SCRNSAVE.EXE' = 'MR_COO~1.SCR'
[<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'kyzxz' = 'vbdbe.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Aloemni_Smoensa_Pangkalpinang' = 'Mr_CoolFace'
[<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'SysSmansa' = '%WINDIR%\smss.exe'
[<HKLM>\SOFTWARE\Classes\comfile\shell\open\command] '' = '"C:\explorer.exe" "%1" %*'
[<HKLM>\SOFTWARE\Classes\batfile\shell\open\command] '' = '"C:\explorer.exe" "%1" %*'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe, C:\explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Shell' = 'explorer.exe "C:\explorer.exe"'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ANSAV32.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ANS-AV~32.EXE] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tasklist.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nod32.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nod32kui.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccapp.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nod32krn.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winamp.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CClaw.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nvcod.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Njeeves.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nvcoas.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\URemovalCRC32.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nvccf.exe] 'Debugger' = 'C:\Explorer.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Niu.exe] 'Debugger' = 'C:\Explorer.exe'
Creates or modifies the following files:
%HOMEPATH%\Start Menu\Programs\Startup\winlogon.exe
%ALLUSERSPROFILE%\Start Menu\Programs\Startup\Renova.exe
%WINDIR%\Tasks\At3.job
%WINDIR%\Tasks\At1.job
%WINDIR%\Tasks\At2.job
Changes the following executable system files:
Creates the following files on removable media:
<Drive name for removable media>:\My Picture.scr
<Drive name for removable media>:\My_Wallpaper.exe
<Drive name for removable media>:\Beautiful Princess.jpg .jpg
<Drive name for removable media>:\Beautiful Princess.jpg .scr
<Drive name for removable media>:\Desktop.ini
<Drive name for removable media>:\Autorun.inf
<Drive name for removable media>:\Penylethylamine.scr
<Drive name for removable media>:\Renova.htt
<Drive name for removable media>:\Xenova.scr
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
hidden files
file extensions
blocks the following features:
Creates and executes the following:
'%HOMEPATH%\Local Settings\m.exe'
'<LS_APPDATA>\Alisa.exe'
'%PROGRAM_FILES%\services.exe'
'<LS_APPDATA>\Emma.exe'
Executes the following:
'<SYSTEM32>\at.exe' 17:17 /every:Sunday,Monday,Tuesday,Wednesday,Thursday,Friday,Saturday "PENYLETHLAM1NE.SCR"
'%WINDIR%\explorer.exe'
'<SYSTEM32>\at.exe' 11:11 /every:Sunday,Monday,Tuesday,Wednesday,Thursday,Friday,Saturday "1MAG1NARY_NUMBER.EXE"
'<SYSTEM32>\at.exe' 22:22 /every:Sunday,Monday,Tuesday,Wednesday,Thursday,Friday,Saturday "PARAD1S0_PERDUT0.PIF"
Terminates or attempts to terminate
the following system processes:
Modifies settings of Windows Explorer:
[<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer] 'NoFind' = '00000001'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoFind' = '00000001'
Sets a new unauthorized home page for Windows Internet Explorer.
Modifies file system :
Creates the following files:
%CommonProgramFiles%\msheart.exe
%CommonProgramFiles%\N0TEPAD.exe
%CommonProgramFiles%\MUTATI0N.com
%CommonProgramFiles%\freecel.exe
%CommonProgramFiles%\kalkulator.exe
%CommonProgramFiles%\tskmgr.exe
%CommonProgramFiles%\mspa1nt.exe
%CommonProgramFiles%\w1nm1ne.exe
%ALLUSERSPROFILE%\Documents\Cantik.jpg
<LS_APPDATA>\Alisa.exe
%PROGRAM_FILES%\services.exe
C:\explorer.exe
<LS_APPDATA>\Emma.exe
%APPDATA%\Renova.htt
%APPDATA%\Renova.ini
%HOMEPATH%\Local Settings\Mr_CF_Mutation.UltimaWeapon
%HOMEPATH%\Local Settings\m.exe
%CommonProgramFiles%\reged1t.exe
C:\Renova_Join.htm
%TEMP%\tmp1.tmp
C:\Mutant.htm
%HOMEPATH%\My Documents\Twin_Angels.htm
%HOMEPATH%\My Documents\Mutation.scr
%HOMEPATH%\My Documents\Twin_Angels.scr
%TEMP%\tmp2.tmp
%HOMEPATH%\My Documents\Mutation.htm
%CommonProgramFiles%\msconf1g.exe
%CommonProgramFiles%\1EXPL0RE.EXE
%CommonProgramFiles%\kartu.exe
%CommonProgramFiles%\Laba_Laba.exe
%ALLUSERSPROFILE%\Documents\Nitip dulu jangan dihapus.scr
%ALLUSERSPROFILE%\Documents\Lapangan Merdeka.scr
%CommonProgramFiles%\W0RDPAD.exe
%ALLUSERSPROFILE%\Documents\Smansa_Pkp .scr
<SYSTEM32>\Mr_CoolFace.scr
<SYSTEM32>\PARAD1S0_PERDUT0.PIF
<SYSTEM32>\PENYLETHLAM1NE.SCR
%APPDATA%\Mr_CoolFace_TwinAngels_Emma_Alisa.inf
<SYSTEM32>\1MAG1NARY_NUMBER.EXE
%APPDATA%\Mr_CF\The_Link.rtf
%HOMEPATH%\My Documents\JUST LINK\Information.rtf
%APPDATA%\Mr_CF\Renova_Join_Mr_CoolFace.htt
%APPDATA%\Mr_CF\Emira_N_Aliciana_IsBack.ini
%PROGRAM_FILES%\PC_MAV.EXE
%PROGRAM_FILES%\Hanya Pesan Untuknya.exe
%PROGRAM_FILES%\I_Miss_U_My_Princess.scr
%WINDIR%\smss.exe
%PROGRAM_FILES%\Irma Triana.scr
%CommonProgramFiles%\Emira.Emma
%CommonProgramFiles%\Aliciana.Alisa
%PROGRAM_FILES%\Your_Prince_Will_Be_Waiting_For_You.scr
%PROGRAM_FILES%\May be Smansa was wonderful place to us.scr
C:\Penylethylamine.scr
%APPDATA%\Mutant.exe
%APPDATA%\Sahang.exe
%APPDATA%\Mr_CoolFace.exe
%APPDATA%\SMA Negeri 1 Pangkalpinang.exe
<LS_APPDATA>\Polymorph2.exe
%TEMP%\inf4D2.tmp
%APPDATA%\Timah.exe
<LS_APPDATA>\Polymorph1.exe
%APPDATA%\explorer.exe
C:\Renova.htt
C:\Desktop.ini
C:\Autorun.inf
C:\Xenova.scr
<SYSTEM32>\vbdbe.exe
%WINDIR%\Negeri Serumpun Sebalai .pif .bat .com .scr .exe
<SYSTEM32>\Matter_Irradiation_Dissociative_Acceleration_System.M.I.D.A.S
%HOMEPATH%\Local Settings\AKGNAB_UALUP.exe
Sets the 'hidden' attribute to the following files:
%PROGRAM_FILES%\services.exe
%ALLUSERSPROFILE%\Documents\Cantik.jpg
C:\explorer.exe
<SYSTEM32>\vbdbe.exe
<SYSTEM32>\Mr_CoolFace.scr
%HOMEPATH%\My Documents\Mutation.htm
%HOMEPATH%\My Documents\Twin_Angels.htm
C:\Renova_Join.htm
<Drive name for removable media>:\Beautiful Princess.jpg .jpg
C:\Mutant.htm
C:\Desktop.ini
C:\Renova.htt
C:\Xenova.scr
C:\Autorun.inf
C:\Penylethylamine.scr
<Drive name for removable media>:\Desktop.ini
<Drive name for removable media>:\Renova.htt
<Drive name for removable media>:\Xenova.scr
<Drive name for removable media>:\Autorun.inf
<Drive name for removable media>:\Penylethylamine.scr
Deletes the following files:
%CommonProgramFiles%\MUTATI0N.com
Miscellaneous:
Searches for the following windows:
ClassName: '' WindowName: 'Registry Editor'
ClassName: '' WindowName: 'System Configuration Utility'
ClassName: '' WindowName: 'Multikiller2'
ClassName: '' WindowName: 'inf4D2.tmp - Entry Point Not Found'
ClassName: '' WindowName: 'Multikiller'
ClassName: '' WindowName: 'Zanda'
ClassName: '' WindowName: 'Zanda\s little helper'
ClassName: '' WindowName: 'Process Explorer'
ClassName: '' WindowName: 'System Restore'
ClassName: '' WindowName: 'Process Viewer'
ClassName: 'SysListView32' WindowName: ''
ClassName: 'OleMainThreadWndClass' WindowName: ''
ClassName: 'BaseBar' WindowName: 'ChanApp'
ClassName: 'Proxy Desktop' WindowName: ''
ClassName: 'Shell_TrayWnd' WindowName: ''
ClassName: 'Button' WindowName: 'Start'
ClassName: '' WindowName: 'Damn!'
ClassName: 'Indicator' WindowName: ''
ClassName: 'SystemTray_Main' WindowName: ''
ClassName: 'CSCHiddenWindow' WindowName: ''
Download Dr.Web for Android
Free three-month trial
All protection features available
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more
OK