wuauclr.exe 病毒

今天打开电脑,然后跑去刷牙洗脸,回来发现系统自动打开了一堆网页。嘿!中毒了!莫名的兴奋啊!好久没中毒了。今天哥就陪你这丫的玩玩。

        关闭傲游浏览器,升级瑞星到最新,用icesword、hijackthis扫描了一下,发现可疑项E:/WINDOWS/System32/wuauclr.exe

        在分析电脑问题过程中,关闭浏览器后,每过一段时间又会自动打开网页。找到system32目录下的wuauclr.exe,发现在该目录下还有一个文件wuauclt.exe(这个是微软自动升级用的程序)。咳,病毒制作者惯用的伎俩,把程序名命名的跟微软系统文件的文件名相似到以假乱真的地步。通过查看文件属性可以发现wuauclr.exe没有文件版本信息,而wuauclt.exe有文件版本信息,显示为微软的文件,Windows update autoupdate client。

       强行结束进程wuauclr.exe,系统不再自动打开网页。用瑞星扫描wuauclr.exe没有发现病毒。上传文件到irustotal进行扫描,扫描结果如下:

     

File wuauclr.exe received on 2010.03.07 06:12:17 (UTC)
AntivirusVersionLast UpdateResult</TD< tr>
a-squared4.5.0.502010.03.06-</TD< tr>
AhnLab-V35.0.0.22010.03.06-</TD< tr>
AntiVir8.2.1.1802010.03.05-</TD< tr>
Antiy-AVL2.0.3.72010.03.05-</TD< tr>
Authentium5.2.0.52010.03.06-</TD< tr>
Avast4.8.1351.02010.03.06-</TD< tr>
Avast55.0.332.02010.03.06-</TD< tr>
AVG9.0.0.7872010.03.06-</TD< tr>
BitDefender7.22010.03.07-</TD< tr>
CAT-QuickHeal10.002010.03.06-</TD< tr>
ClamAV0.96.0.0-git2010.03.06-</TD< tr>
Comodo40912010.02.28-</TD< tr>
DrWeb5.0.1.122222010.03.07-</TD< tr>
eSafe7.0.17.02010.03.04-</TD< tr>
eTrust-Vet35.2.73422010.03.05-</TD< tr>
F-Prot4.5.1.852010.03.06-</TD< tr>
F-Secure9.0.15370.02010.03.07-</TD< tr>
Fortinet4.0.14.02010.03.06-</TD< tr>
GData192010.03.07-</TD< tr>
IkarusT3.1.1.80.02010.03.06-</TD< tr>
Jiangmin13.0.9002010.03.07-</TD< tr>
K7AntiVirus7.10.9902010.03.04-</TD< tr>
Kaspersky7.0.0.1252010.03.07-</TD< tr>
McAfee59122010.03.06-</TD< tr>
McAfee+Artemis59122010.03.06-</TD< tr>
McAfee-GW-Edition6.8.52010.03.07Heuristic.BehavesLike.Win32.Suspicious.L</TD< tr>
Microsoft1.55022010.03.06-</TD< tr>
NOD3249212010.03.06-</TD< tr>
Norman6.04.082010.03.06-</TD< tr>
nProtect2009.1.8.02010.03.06-</TD< tr>
Panda10.0.2.22010.03.06Suspicious file</TD< tr>
PCTools7.0.3.52010.03.04Downloader.Generic</TD< tr>
Prevx3.02010.03.07High Risk Cloaked Malware</TD< tr>
Rising22.37.06.032010.03.07-</TD< tr>
Sophos4.51.02010.03.07-</TD< tr>
Sunbelt57762010.03.07-</TD< tr>
Symantec20091.2.0.412010.03.07Downloader</TD< tr>
TheHacker6.5.1.9.2232010.03.07-</TD< tr>
TrendMicro9.120.0.10042010.03.07-</TD< tr>
VBA323.12.12.22010.03.05-</TD< tr>
ViRobot2010.3.5.22142010.03.05-</TD< tr>
VirusBuster5.0.27.02010.03.06-</TD< tr>
 
Additional information
File size: 57344 bytes
MD5...: 719a9d661af7f037894aebe3ffc94d20
SHA1..: 1a7d0b15495ad52119f30a9c73ba09461762d464
SHA256: c47c2c00c14ff190f7fc22d96b6899173d58c86ed4db76998fd24150e00c70ac
ssdeep: 768:NPIVqGcWC0Lu7KJ6v0GEuSUDgTn11fbh3F3j5bz7lIfs:eNeKJ6vzzSIgb11
f113Vlu
PEiD..: -
PEInfo: PE Structure information

( base data )
entrypointaddress.: 0x338f
timedatestamp.....: 0x4b927222 (Sat Mar 06 15:17:54 2010)
machinetype.......: 0x14c (I386)

( 3 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x8187 0x9000 6.27 8993c5fd96af248c7dc0adaa81f139a8
.rdata 0xa000 0xb8a 0x1000 4.37 f4f9a316e7053b2515b4cdecdcda4d57
.data 0xb000 0x47c0 0x3000 1.27 84384a50ee421201ae8d55c04ad2973f

( 3 imports )
> KERNEL32.dll: CloseHandle, ReadFile, WriteFile, CreateFileA, WaitNamedPipeA, FreeLibrary, GetProcAddress, LoadLibraryA, GetPrivateProfileStringA, GetModuleFileNameA, GetTempPathA, GetSystemDirectoryA, CreateEventA, OpenEventA, DeleteFileA, MoveFileExA, Sleep, WritePrivateProfileStringA, GetVolumeInformationA, GetFileSize, CompareStringW, CompareStringA, FlushFileBuffers, GetStringTypeW, HeapFree, HeapAlloc, GetTimeZoneInformation, GetSystemTime, GetLocalTime, GetModuleHandleA, GetStartupInfoA, GetCommandLineA, GetVersion, ExitProcess, GetEnvironmentVariableA, GetVersionExA, HeapDestroy, HeapCreate, VirtualFree, VirtualAlloc, HeapReAlloc, WideCharToMultiByte, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, FreeEnvironmentStringsA, FreeEnvironmentStringsW, GetEnvironmentStrings, GetEnvironmentStringsW, SetHandleCount, GetStdHandle, GetFileType, RtlUnwind, GetLastError, SetFilePointer, GetCPInfo, GetACP, GetOEMCP, SetStdHandle, MultiByteToWideChar, LCMapStringA, LCMapStringW, GetStringTypeA, SetEnvironmentVariableA
> USER32.dll: wsprintfA
> NETAPI32.dll: Netbios

( 0 exports )
RDS...: NSRL Reference Data Set
-
pdfid.: -
trid..: Win32 Executable MS Visual C++ (generic) (65.2%)
Win32 Executable Generic (14.7%)
Win32 Dynamic Link Library (generic) (13.1%)
Generic Win/DOS Executable (3.4%)
DOS Executable Generic (3.4%)
sigcheck:
publisher....: n/a
copyright....: n/a
product......: n/a
description..: n/a
original name: n/a
internal name: n/a
file version.: n/a
comments.....: n/a
signers......: -
signing date.: -
verified.....: Unsigned
<a href='http://info.prevx.com/aboutprogramtext.asp?PX5=D8F86ACF0039E38BE0FB00C9591BA700E4B3A926' target='_blank'>http://info.prevx.com/aboutprogramtext.asp?PX5=D8F86ACF0039E38BE0FB00C9591BA700E4B3A926</a>
  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值