JavaScript support is required for our site to be fully operational in your browser.
Win32.HLLW.Autoruner1.45881
Added to the Dr.Web virus database:
2013-07-12
Virus description added:
2013-07-12
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regedit.exe] 'Debugger' = 'C:\\WINDOWS\\notepad.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'MyApp' = '<SYSTEM32>\hkcmdx.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Avgcc' = '%WINDIR%\RegHost.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Cinta' = '%WINDIR%\Cinta.exe'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'ServiceOptionMP3' = '"%WINDIR%\cinta.exe"'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe] 'Debugger' = 'C:\\Windows \\ Notepad.exe '
Creates the following files on removable media:
<Drive name for removable media>:\Cewek Sexy\Telanjang\Buka celana\Buka BH\Jangan dibuka\Dosa\Nyesal bukanya\Buka aja deh\Resep Biar Makin Seksi.exe
<Drive name for removable media>:\Autorun\Readme.exe
<Drive name for removable media>:\Jeritan Rakyat.txt .exe
<Drive name for removable media>:\Puisi Cinta.txt .exe
<Drive name for removable media>:\Autorun.inf
<Drive name for removable media>:\Bootx.exe
<Drive name for removable media>:\RECYCLER\S-5-3-42-2819952290-8240758988-879315005-3665\jwgkvsq.vmx
<Drive name for removable media>:\RECYCLER\S-5-3-42-2819952290-8240758988-879315005-3665\Readme.exe
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
hidden files
file extensions
blocks execution of the following system utilities:
Command Prompt (CMD)
Windows Task Manager (Taskmgr)
Registry Editor (RegEdit)
Executes the following:
'<SYSTEM32>\taskkill.exe' /f /im Cinta.exe
'<SYSTEM32>\notepad.exe' %WINDIR%\Cinta.txt
Modifies settings of Windows Explorer:
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoViewContextMenu' = '00000001'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoControlPanel' = '00000001'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoViewOnDrive' = '00000001'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoStartMenuMorePrograms' = '00000001'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoFind' = '00000001'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoRun' = '00000001'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoClose' = '00000001'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoFolderOptions' = '00000001'
Modifies settings of Windows Internet Explorer:
[<HKCU>\Software\Microsoft\Internet Explorer\Main] 'Window Title' = ':: I LOVE YOU SITI ERNI RITONGA ::'
[<HKCU>\Software\Microsoft\Internet Explorer\Main] 'Window Title' = '::Rakayasa::Virus::'
Modifies file system :
Creates the following files:
C:\Smad-Lock\Readme.exe
C:\Autorun\Readme.exe
C:\RECYCLER\S-5-3-42-2819952290-8240758988-879315005-3665\Readme.exe
C:\RECYCLER\S-5-3-42-2819952290-8240758988-879315005-3665\jwgkvsq.vmx
C:\Cewek Sexy\Telanjang\Buka celana\Buka BH\Jangan dibuka\Dosa\Nyesal bukanya\Buka aja deh\Resep Biar Makin Seksi.exe
%WINDIR%\winamp.dll.exe
C:\Cinta.txt
%WINDIR%\Cinta.exe
<SYSTEM32>\Cinta.exe
%ALLUSERSPROFILE%\Start Menu\Programs\Smadav\Readme.exe
C:\Bootx.exe
C:\Autorun.inf
%WINDIR%\Cinta.txt
%WINDIR%\RegHost.exe
<SYSTEM32>\Cinta.scr
%PROGRAM_FILES%\Smadav\Readme.exe
<SYSTEM32>\hkcmdx.exe
%WINDIR%\system\hkcmd.exe
Sets the 'hidden' attribute to the following files:
<Drive name for removable media>:\Autorun.inf
%WINDIR%\RegHost.exe
<SYSTEM32>\hkcmdx.exe
C:\Bootx.exe
C:\Autorun.inf
<Drive name for removable media>:\Bootx.exe
Deletes the following files:
<SYSTEM32>\dllcache\evtquery.vbs
<SYSTEM32>\dllcache\pagefile.vbs
<SYSTEM32>\dllcache\prncnfg.vbs
<SYSTEM32>\prnport.vbs
<SYSTEM32>\prnqctl.vbs
<SYSTEM32>\pubprn.vbs
<SYSTEM32>\dllcache\prndrvr.vbs
<SYSTEM32>\dllcache\prnqctl.vbs
<SYSTEM32>\dllcache\pubprn.vbs
<Auxiliary element>
<SYSTEM32>\dllcache\prnjobs.vbs
<SYSTEM32>\dllcache\prnmngr.vbs
<SYSTEM32>\dllcache\prnport.vbs
<SYSTEM32>\prnmngr.vbs
%WINDIR%\Help\Tours\WindowsMediaPlayer\Video\rtuner.wmv
%WINDIR%\Help\Tours\WindowsMediaPlayer\Video\viz.wmv
<SYSTEM32>\oobe\images\intro.wmv
%WINDIR%\Help\Tours\WindowsMediaPlayer\Video\copycd.wmv
%WINDIR%\Help\Tours\WindowsMediaPlayer\Video\mdlib.wmv
%WINDIR%\Help\Tours\WindowsMediaPlayer\Video\nuskin.wmv
<SYSTEM32>\ias\dnary.mdb
<SYSTEM32>\prncnfg.vbs
<SYSTEM32>\prndrvr.vbs
<SYSTEM32>\prnjobs.vbs
<SYSTEM32>\ias\ias.mdb
<SYSTEM32>\eventquery.vbs
<SYSTEM32>\pagefileconfig.vbs
Miscellaneous:
Searches for the following windows:
ClassName: 'RegEdit_RegEdit' WindowName: '(null)'
ClassName: 'MPGenericPaneClass' WindowName: '(null)'
ClassName: 'WMP Skin Host' WindowName: '(null)'
ClassName: 'avg70controlcenter' WindowName: '(null)'
ClassName: 'Shell_TrayWnd' WindowName: '(null)'
ClassName: 'Indicator' WindowName: '(null)'
ClassName: '(null)' WindowName: '(null)'
Download Dr.Web for Android
Free three-month trial
All protection features available
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more
OK