Win32.HLLW.Autohit.14218
Added to the Dr.Web virus database:
2013-12-15
Virus description added:
2013-12-21
Technical Information
Malicious functions:
Creates and executes the following:
- 'C:\ProgramData\System.exe' "del" <Full path to virus>
Executes the following:
- '<SYSTEM32>\wermgr.exe' "-outproc" "848" "4156"
- '<SYSTEM32>\slui.exe' -Embedding
Modifies file system :
Creates the following files:
- %TEMP%\liivjyv
- %TEMP%\autC783.tmp
- C:\ProgramData\Microsoft\Windows\WER\ReportQueue\NonCritical_80072f78_805ff6e6daf5fedbb13daf2b1d56b5cbd7ea195_cab_0b6471e4\client_manifest.txt
- C:\ProgramData\Microsoft\Windows\WER\ReportQueue\NonCritical_7.6.7600.256_d2caf64b7dbca2d781154d2562964c262846251_cab_0bc877fc\Report.wer
- %WINDIR%\Temp\OutofProcReport1078676.txt
- %TEMP%\kidnshz
- %TEMP%\aut9896.tmp
- C:\ProgramData\System.exe.ini
- C:\ProgramData\System.exe
Deletes the following files:
- %TEMP%\liivjyv
- %WINDIR%\Temp\OutofProcReport1078676.txt
- %TEMP%\autC783.tmp
- %TEMP%\aut9896.tmp
- %TEMP%\kidnshz
Network activity:
Connects to:
- '20#.#6.232.182':80
- 'download.windowsupdate.com':80
TCP:
HTTP GET requests:
- 20#.#6.232.182/fwlink/?Li######################################################################################################
UDP:
- DNS ASK www.up####.microsoft.com
- DNS ASK go.###rosoft.com
- DNS ASK download.windowsupdate.com
- DNS ASK do#####d.microsoft.com
Miscellaneous:
Searches for the following windows:
- ClassName: 'OleMainThreadWndClass' WindowName: '(null)'
欢迎下载
Dr.Web for Android
-
免费3个月
-
可使用所有保护组件
-
可在AppGallery/Google Pay延期
继续使用此网站意味着您同意我们使用Cookie文件和其他用于收集网站访问统计信息的技术手段。详细信息