Win32.HLLW.Autohit.16252
Added to the Dr.Web virus database:
2017-05-05
Virus description added:
2017-05-05
Technical Information
To ensure autorun and distribution:
Creates or modifies the following files:
- %HOMEPATH%\Start Menu\Programs\Startup\Microsoft Update.lnk
Creates the following files on removable media:
- <Drive name for removable media>:\x.exe
Malicious functions:
Executes the following:
Searches for registry branches where third party applications store passwords:
- [<HKLM>\Software\Valve\Steam]
- [<HKCU>\Software\Valve\Steam]
Modifies file system:
Creates the following files:
- %TEMP%\aut3.tmp
- %TEMP%\KRZISO.exe
- %TEMP%\Data.txt
- %TEMP%\Hide.dll
- %TEMP%\aut1.tmp
- %TEMP%\rlzzwkg
- %TEMP%\aut2.tmp
Sets the 'hidden' attribute to the following files:
- <Drive name for removable media>:\x.exe
Deletes the following files:
- %TEMP%\aut2.tmp
- %TEMP%\aut3.tmp
- %TEMP%\aut1.tmp
- %TEMP%\rlzzwkg
Network activity:
Connects to:
- 'cl########nload.steampowered.com':80
- 'wp#d':80
TCP:
HTTP GET requests:
- http://cl########nload.steampowered.com/client/steam_client_win32
- http://11#.#11.111.3/wpad.dat via wp#d
UDP:
- DNS ASK wp#d
- DNS ASK cl####3.zapto.org
- DNS ASK cl########nload.steampowered.com
Miscellaneous:
Searches for the following windows:
- ClassName: 'Shell_TrayWnd' WindowName: ''
欢迎下载
Dr.Web for Android
-
免费3个月
-
可使用所有保护组件
-
可在AppGallery/Google Pay延期
继续使用此网站意味着您同意我们使用Cookie文件和其他用于收集网站访问统计信息的技术手段。详细信息