Win32.HLLW.Motovilo.2
Added to the Dr.Web virus database:
2013-05-15
Virus description added:
2013-05-15
Technical Information
Malicious functions:
Executes the following:
- '<SYSTEM32>\taskhost.exe' $(Arg0)
- '<SYSTEM32>\conhost.exe'
Modifies file system :
Creates the following files:
- C:\ProgramData\Microsoft\Windows\WER\ReportQueue\NonCritical_80070422_76a4385aa7fdcd3dc476f7ea51e8ea5565f02fd_072d2683\Report.wer
- C:\ProgramData\Microsoft\IdentityCRL\ppcrlconfig.dll:datas
- C:\ProgramData\Microsoft\RAC\Temp\sql2240.tmp
- C:\ProgramData\Microsoft\RAC\Temp\sql2220.tmp
- %WINDIR%\Temp\MPTelemetrySubmit\watson_manifest.txt
- %WINDIR%\Temp\MPTelemetrySubmit\client_manifest.txt
- C:\ProgramData\Microsoft\IdentityCRL\ppcrlconfig.dll:datacheck
- C:\ProgramData\4444444444444444444.txt
Deletes the following files:
- %WINDIR%\Temp\MPTelemetrySubmit\watson_manifest.txt
- %WINDIR%\Temp\MPTelemetrySubmit\client_manifest.txt
- C:\ProgramData\4444444444444444444.txt
- C:\ProgramData\Microsoft\IdentityCRL\ppcrlconfig.dll:datacheck
Network activity:
Connects to:
- '20#.#6.232.182':80
- 'se####.twitter.com':80
TCP:
HTTP GET requests:
- se####.twitter.com/search.json?q=###################
UDP:
- DNS ASK wa####.microsoft.com
- DNS ASK se####.twitter.com
- '22#.0.0.252':5355
欢迎下载
Dr.Web for Android
-
免费3个月
-
可使用所有保护组件
-
可在AppGallery/Google Pay延期
继续使用此网站意味着您同意我们使用Cookie文件和其他用于收集网站访问统计信息的技术手段。详细信息