Malware

Should I remove “Exploit.Win32.BypassUAC.orz”?

Malware Removal

The Exploit.Win32.BypassUAC.orz is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Exploit.Win32.BypassUAC.orz virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Creates RWX memory
  • Guard pages use detected – possible anti-debugging.
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Attempts to modify proxy settings
  • Harvests cookies for information gathering

Related domains:

wpad.local-net
dl.enhknqql.club
tj.enhknqql.club

How to determine Exploit.Win32.BypassUAC.orz?


File Info:

name: 7D56851D29461AF741EE.mlw
path: /opt/CAPEv2/storage/binaries/58c7257667b3501c2fab094b2553d0c4e4c47614dde03b2affec4e978b19fee2
crc32: DEAE62B0
md5: 7d56851d29461af741ee9e5bf62f53c0
sha1: e3a00bc32a837f9235a1d2178a6bc0c2b0705ae3
sha256: 58c7257667b3501c2fab094b2553d0c4e4c47614dde03b2affec4e978b19fee2
sha512: 1ae31eb10f67522cc80f7d908b2ac0d7a0ed63c2eefb6c66bf0ffb4acc144b07f9d5b1eb4746108b9e44b78cd9b5e7ea400bdd2b0237cde9d4ed98562b646bc7
ssdeep: 6144:7rojx83rBpKkOfeQ25t3LACLbb061ajUdNXvpbovxx+a/Z6py:Ajx8NpKkL5WCLbb061DvJovyS6y
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1DE641222FBC19076F060CB304E2292480A7B7E271D3C255D76DC6C9E5F375D2A61A7AB
sha3_384: de2ba9783b3b8d06f91cce92b179926cf9af87e8267635b8c8fe805ab28ccbc94106695e7df5a04c77560c79d327f3bc
ep_bytes: 558bec83c4c453565733c08945f08945
timestamp: 1992-06-19 22:22:17

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName: 10781
FileDescription: 10781 Setup
FileVersion:
LegalCopyright:
ProductName: 10781
ProductVersion: 10781
Translation: 0x0000 0x04b0

Exploit.Win32.BypassUAC.orz also known as:

LionicHacktool.Win32.BypassUAC.3!c
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.GenericKD.37343994
FireEyeTrojan.GenericKD.37343994
ALYacTrojan.GenericKD.37343994
CylanceUnsafe
ZillyaExploit.BypassUAC.Win32.2086
K7AntiVirusTrojan-Downloader ( 0001e3c01 )
AlibabaTrojanDownloader:Win32/BypassUAC.64eda1ad
K7GWTrojan-Downloader ( 0001e3c01 )
CrowdStrikewin/malicious_confidence_80% (W)
SymantecTrojan.Gen.MBT
ESET-NOD32a variant of Win32/TrojanDownloader.Agent.EBX
APEXMalicious
CynetMalicious (score: 99)
KasperskyExploit.Win32.BypassUAC.orz
BitDefenderTrojan.GenericKD.37343994
NANO-AntivirusExploit.Win32.BypassUAC.fimlql
AvastWin32:Malware-gen
TencentWin32.Exploit.Bypassuac.Ajlu
Ad-AwareTrojan.GenericKD.37343994
ComodoMalware@#22d6jqcji752z
DrWebTrojan.DownLoader27.5626
VIPRETrojan.Win32.Generic!BT
TrendMicroTROJ_GEN.R002C0PH621
SophosMal/Generic-S
GDataTrojan.GenericKD.37343994
JiangminTrojan.Generic.dkuth
MAXmalware (ai score=99)
ArcabitTrojan.Generic.D239D2FA
MicrosoftTrojan:Win32/Skeeyah.A!rfn
AhnLab-V3PUP/Win32.DealPlay.R365175
McAfeeRDN/Generic Downloader.x
MalwarebytesMalware.AI.3869358055
TrendMicro-HouseCallTROJ_GEN.R002C0PH621
IkarusTrojan.Downloader.Inno.Agent
FortinetW32/Agent.EBX!tr.dldr
AVGWin32:Malware-gen

How to remove Exploit.Win32.BypassUAC.orz?

Exploit.Win32.BypassUAC.orz removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment