Mi biblioteca
Mi biblioteca

+ Añadir a la biblioteca

Soporte
Soporte 24 horas | Normas de contactar

Sus solicitudes

Perfil

Win32.HLLW.Autoruner.14325.origin

Added to the Dr.Web virus database: 2021-09-04

Virus description added:

Technical Information

To ensure autorun and distribution
Modifies the following registry keys
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'perfhost' = '"%APPDATA%\{F862D2D4-DB0E-A113-184E-1775448706BE}\perfhost.exe"'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\RunOnce] 'perfhost' = '"%APPDATA%\{F862D2D4-DB0E-A113-184E-1775448706BE}\perfhost.exe"'
  • [<HKCU>\Software\Microsoft\Command Processor] 'AutoRun' = '"%APPDATA%\{F862D2D4-DB0E-A113-184E-1775448706BE}\perfhost.exe"'
  • [<HKCU>\Control Panel\Desktop] 'SCRNSAVE.EXE' = '"%APPDATA%\{F862D2D4-DB0E-A113-184E-1775448706BE}\perfhost.exe"'
Creates or modifies the following files
  • %APPDATA%\microsoft\windows\start menu\programs\startup\perfhost.lnk
Malicious functions
Executes the following
  • '%WINDIR%\syswow64\taskkill.exe' /t /f /im "<File name>.exe"
Modifies file system
Creates the following files
  • %APPDATA%\{f862d2d4-db0e-a113-184e-1775448706be}\perfhost.exe
Deletes itself.
Miscellaneous
Searches for the following windows
  • ClassName: 'W naiLcrf' WindowName: 'zsfiynkl'
  • ClassName: 'k ssjy uvmoUBN' WindowName: ''
Creates and executes the following
  • '%APPDATA%\{f862d2d4-db0e-a113-184e-1775448706be}\perfhost.exe'
  • '%WINDIR%\syswow64\cmd.exe' /c taskkill /t /f /im "<File name>.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "<Full path to file>" > NUL' (with hidden window)
Executes the following
  • '%WINDIR%\syswow64\cmd.exe' /c taskkill /t /f /im "<File name>.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "<Full path to file>" > NUL
  • '%WINDIR%\syswow64\ping.exe' -n 1 127.0.0.1