Win32.HLLW.Autoruner.14325.origin
Added to the Dr.Web virus database:
2021-09-04
Virus description added:
2021-09-04
Technical Information
To ensure autorun and distribution
Modifies the following registry keys
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'perfhost' = '"%APPDATA%\{F862D2D4-DB0E-A113-184E-1775448706BE}\perfhost.exe"'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\RunOnce] 'perfhost' = '"%APPDATA%\{F862D2D4-DB0E-A113-184E-1775448706BE}\perfhost.exe"'
- [<HKCU>\Software\Microsoft\Command Processor] 'AutoRun' = '"%APPDATA%\{F862D2D4-DB0E-A113-184E-1775448706BE}\perfhost.exe"'
- [<HKCU>\Control Panel\Desktop] 'SCRNSAVE.EXE' = '"%APPDATA%\{F862D2D4-DB0E-A113-184E-1775448706BE}\perfhost.exe"'
Creates or modifies the following files
- %APPDATA%\microsoft\windows\start menu\programs\startup\perfhost.lnk
Malicious functions
Executes the following
- '%WINDIR%\syswow64\taskkill.exe' /t /f /im "<File name>.exe"
Modifies file system
Creates the following files
- %APPDATA%\{f862d2d4-db0e-a113-184e-1775448706be}\perfhost.exe
Deletes itself.
Miscellaneous
Searches for the following windows
- ClassName: 'W naiLcrf' WindowName: 'zsfiynkl'
- ClassName: 'k ssjy uvmoUBN' WindowName: ''
Creates and executes the following
- '%APPDATA%\{f862d2d4-db0e-a113-184e-1775448706be}\perfhost.exe'
- '%WINDIR%\syswow64\cmd.exe' /c taskkill /t /f /im "<File name>.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "<Full path to file>" > NUL' (with hidden window)
Executes the following
- '%WINDIR%\syswow64\cmd.exe' /c taskkill /t /f /im "<File name>.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "<Full path to file>" > NUL
- '%WINDIR%\syswow64\ping.exe' -n 1 127.0.0.1
欢迎下载
Dr.Web for Android
-
免费3个月
-
可使用所有保护组件
-
可在AppGallery/Google Pay延期
继续使用此网站意味着您同意我们使用Cookie文件和其他用于收集网站访问统计信息的技术手段。详细信息