Trojan.Reveton.N
Posted: December 6, 2012
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 8/10 |
---|---|
Infected PCs: | 1,843 |
First Seen: | December 6, 2012 |
---|---|
Last Seen: | August 4, 2021 |
OS(es) Affected: | Windows |
Trojan.Reveton.N (Trojan:Win32/Reveton.N) is a ransomware Trojan that demands a ransom from victims for the imaginary possession of illegitimate material or cybercrime activities. Trojan.Reveton.N displays a full-screen webpage including image/alert, localized according to the targeted location, providing instructions for the payment of the supposed fine. The webpage covers all other windows on the affected PC and makes the computer unusable. Trojan.Reveton.N also creates a shortcut file, which points to the DLL file, enabling the DLL file to run automatically every time you start the computer. Trojan.Reveton.N modifies your Internet Explorer settings by creating registry entries. Trojan.Reveton.N does not display the protected mode banner in Internet Explorer. Trojan.Reveton.N enables mixed content to display in Internet Explorer. Trojan.Reveton.N stops legitimate processes from running on the infected computer.
Aliases
More aliases (889)
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:%SystemDrive%\Users\<username>\AppData\Local\Temp\30KKziH.exe
File name: 30KKziH.exeSize: 235.52 KB (235520 bytes)
MD5: fd8b5b86571606c1767118b4a82209eb
Detection count: 86
File type: Executable File
Mime Type: unknown/exe
Path: %SystemDrive%\Users\<username>\AppData\Local\Temp
Group: Malware file
Last Updated: February 6, 2013
%SystemDrive%\Users\<username>\wgsdgsdgdsgsd.exe
File name: wgsdgsdgdsgsd.exeSize: 180.73 KB (180736 bytes)
MD5: 8d98c5b6fb078ae21a79b6847cdbb569
Detection count: 83
File type: Executable File
Mime Type: unknown/exe
Path: %SystemDrive%\Users\Patanisca
Group: Malware file
Last Updated: February 6, 2013
%SystemDrive%\Users\<username>\3629944.dll
File name: 3629944.dllSize: 188.41 KB (188416 bytes)
MD5: 22e8ab5a33e05fa820386cc4058b1bf8
Detection count: 74
File type: Dynamic link library
Mime Type: unknown/dll
Path: %SystemDrive%\Users\Eetu.Keijo-PC
Group: Malware file
Last Updated: February 6, 2013
%SystemDrive%\Users\<username>\AppData\Local\Temp\30KKziH.exe
File name: 30KKziH.exeSize: 212.99 KB (212992 bytes)
MD5: cce29c68e7b28580150bacaa63d0ff3e
Detection count: 72
File type: Executable File
Mime Type: unknown/exe
Path: %SystemDrive%\Users\<username>\AppData\Local\Temp
Group: Malware file
Last Updated: February 7, 2013
%SystemDrive%\Users\<username>\1628045.dll
File name: 1628045.dllSize: 237.56 KB (237568 bytes)
MD5: cfc1f090e9c97045631695ac280128e3
Detection count: 65
File type: Dynamic link library
Mime Type: unknown/dll
Path: %SystemDrive%\Users\dziubek
Group: Malware file
Last Updated: April 23, 2013
%SystemDrive%\Users\<username>\wgsdgsdgdsgsd.exe
File name: wgsdgsdgdsgsd.exeSize: 160.25 KB (160256 bytes)
MD5: 14d8d4e9f5141213b6e1d7f9cb6456b6
Detection count: 60
File type: Executable File
Mime Type: unknown/exe
Path: %SystemDrive%\Users\Parcs
Group: Malware file
Last Updated: January 29, 2013
%SystemDrive%\Users\<username>\6269007.dll
File name: 6269007.dllSize: 169.98 KB (169984 bytes)
MD5: 025fb7e6c545ad040c170bf434aec5fd
Detection count: 55
File type: Dynamic link library
Mime Type: unknown/dll
Path: %SystemDrive%\Users\Makoto
Group: Malware file
Last Updated: March 29, 2013
%SystemDrive%\Users\<username>\AppData\Local\Temp\1jfuweif.dll
File name: 1jfuweif.dllSize: 204.8 KB (204800 bytes)
MD5: 589f905bc77f5976692ee4e6de31eb7a
Detection count: 45
File type: Dynamic link library
Mime Type: unknown/dll
Path: %SystemDrive%\Users\<username>\AppData\Local\Temp
Group: Malware file
Last Updated: February 12, 2013
%SystemDrive%\Users\<username>\AppData\Local\Temp\jrscpls.exe
File name: jrscpls.exeSize: 186.36 KB (186368 bytes)
MD5: c6a10630b4a4e487edef01e0beea2a39
Detection count: 44
File type: Executable File
Mime Type: unknown/exe
Path: %SystemDrive%\Users\<username>\AppData\Local\Temp
Group: Malware file
Last Updated: February 6, 2013
%SystemDrive%\Users\<username>\AppData\Local\Temp\jrscpls.exe
File name: jrscpls.exeSize: 169.98 KB (169984 bytes)
MD5: e42916d7a0e59b0f4469bb881dcfcb4f
Detection count: 40
File type: Executable File
Mime Type: unknown/exe
Path: %SystemDrive%\Users\<username>\AppData\Local\Temp
Group: Malware file
Last Updated: February 11, 2013
%SystemDrive%\Users\<username>\wgsdgsdgdsgsd.exe
File name: wgsdgsdgdsgsd.exeSize: 188.41 KB (188416 bytes)
MD5: 9bfecd6c7e8b9ad47614282cec2d9f52
Detection count: 35
File type: Executable File
Mime Type: unknown/exe
Path: %SystemDrive%\Users\G?st
Group: Malware file
Last Updated: February 12, 2013
%SystemDrive%\Users\<username>\wgsdgsdgdsgsd.exe
File name: wgsdgsdgdsgsd.exeSize: 139.26 KB (139264 bytes)
MD5: d02e01a2707d17efef15101334e9ed77
Detection count: 21
File type: Executable File
Mime Type: unknown/exe
Path: %SystemDrive%\Users\Daniel
Group: Malware file
Last Updated: February 22, 2013
%SystemDrive%\Users\<username>\wgsdgsdgdsgsd.exe
File name: wgsdgsdgdsgsd.exeSize: 311.29 KB (311296 bytes)
MD5: 33a60b981e0629852c22b07db80466cf
Detection count: 19
File type: Executable File
Mime Type: unknown/exe
Path: %SystemDrive%\Users\Neil
Group: Malware file
Last Updated: February 12, 2013
%SystemDrive%\Users\<username>\4452018.dll
File name: 4452018.dllSize: 225.28 KB (225280 bytes)
MD5: f8bc33de7a2a9d8277da1fe454965b1d
Detection count: 16
File type: Dynamic link library
Mime Type: unknown/dll
Path: %SystemDrive%\Users\Mike Causer
Group: Malware file
Last Updated: February 7, 2013
%SystemDrive%\Users\<username>\AppData\Local\Temp\wlsidten.dll
File name: wlsidten.dllSize: 169.47 KB (169472 bytes)
MD5: e66b95e19820579c9e6191596fb4daf4
Detection count: 14
File type: Dynamic link library
Mime Type: unknown/dll
Path: %SystemDrive%\Users\<username>\AppData\Local\Temp
Group: Malware file
Last Updated: March 21, 2013
%SystemDrive%\Users\<username>\wgsdgsdgdsgsd.exe
File name: wgsdgsdgdsgsd.exeSize: 143.36 KB (143360 bytes)
MD5: d1792c1fa2ecea9c92fdeda05530fe79
Detection count: 11
File type: Executable File
Mime Type: unknown/exe
Path: %SystemDrive%\Users\Peter
Group: Malware file
Last Updated: January 23, 2013
%SystemDrive%\Users\<username>\wgsdgsdgdsgsd.exe
File name: wgsdgsdgdsgsd.exeSize: 135.16 KB (135168 bytes)
MD5: 52f4db8858b265619b3ab0e95e737ca9
Detection count: 7
File type: Executable File
Mime Type: unknown/exe
Path: %SystemDrive%\Users\a
Group: Malware file
Last Updated: February 6, 2013
%USERPROFILE%\Pictures\Music\wgsdgsdgdsgsd.exe
File name: wgsdgsdgdsgsd.exeSize: 139.26 KB (139264 bytes)
MD5: 0267bfacfcc40ed5fe25365edc5805e7
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %USERPROFILE%\Pictures\Music
Group: Malware file
Last Updated: June 4, 2020
%SystemDrive%\Documents and Settings\Kieron\Local Settings\Temp\wlsidten.dll
File name: wlsidten.dllSize: 180.73 KB (180736 bytes)
MD5: 101e33a3cf8d05db851de1323c9b60ae
Detection count: 4
File type: Dynamic link library
Mime Type: unknown/dll
Path: %SystemDrive%\Documents and Settings\Kieron\Local Settings\Temp
Group: Malware file
Last Updated: February 6, 2013
[RANDOM CHARACTERS].tmp
File name: [RANDOM CHARACTERS].tmpFile type: Temporary File
Mime Type: unknown/tmp
Group: Malware file
[RANDOM CHARACTERS].dll
File name: [RANDOM CHARACTERS].dllFile type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
!d2.tmp
File name: !d2.tmpFile type: Temporary File
Mime Type: unknown/tmp
Group: Malware file
!d7.tmp
File name: !d7.tmpFile type: Temporary File
Mime Type: unknown/tmp
Group: Malware file
[startup folder]\runctf.lnk
File name: [startup folder]\runctf.lnkFile type: Shortcut
Mime Type: unknown/lnk
Group: Malware file
%AppData%\[reverse of file name].pad
File name: %AppData%\[reverse of file name].padMime Type: unknown/pad
Group: Malware file
%SystemDrive%\Users\<username>\259216799.exe
File name: 259216799.exeSize: 204.8 KB (204800 bytes)
MD5: d6614f90b55d879c7105bee8be9907c5
Detection count: 0
File type: Executable File
Mime Type: unknown/exe
Path: %SystemDrive%\Users\Jenna
Group: Malware file
Last Updated: February 7, 2013
More files
Registry Modifications
HKEY..\..\{Value}HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main "NoProtectedModeBanner" = "dword:00000001"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 "1609" = "dword:00000000"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 "2500" = "dword:00000003"HKEY..\..\..\..{Subkeys}HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2HKEY_CURRENT_USERU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.