Malware

Hiloti.2 removal guide

Malware Removal

The Hiloti.2 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Hiloti.2 virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Injection with CreateRemoteThread in a remote process
  • Attempts to connect to a dead IP:Port (1 unique times)
  • A process attempted to delay the analysis task.
  • Repeatedly searches for a not-found process, may want to run with startbrowser=1 option
  • Unconventionial binary language: Chinese (Simplified)
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • The binary likely contains encrypted or compressed data.
  • Uses Windows utilities for basic functionality
  • Executed a process and injected code into it, probably while unpacking
  • Deletes its original binary from disk
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Network activity contains more than one unique useragent.
  • Installs itself for autorun at Windows startup
  • Attempts to modify proxy settings
  • A possible cryptomining command was executed
  • Uses suspicious command line tools or Windows utilities

Related domains:

z.whorecord.xyz
a.tomx.xyz
361com.com
www.361com.com
pool.usa-138.com

How to determine Hiloti.2?


File Info:

crc32: D74657BE
md5: 27c54f9295ca4da9cf1fc371740edd41
name: 11.exe
sha1: bb58b15be93dfaf85d49fc6d04cf1ab440e1a137
sha256: dbdb4276154a60313db2f2726c24b14c6dfb1cfa1e30d8458cb2cf0c5771ab5a
sha512: da456fbc18857c920133cae5fa67c6a5f31d9389d11308f4b0a858ec338ce1aa3b782c04f78cda8e5d232715c1a3b9a44316740d629d73a9bff82d859fd78d54
ssdeep: 49152:t8C9EQm+ffMy4RLaXYhDUv8LjVD7+j38QmS+:jEsMTRqYVtD7+j3+
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: TenCent QQ 2020
FileVersion: 1.0.0.0
CompanyName: TenCent
Comments: QQ2020
ProductName: QQ2020
ProductVersion: 1.0.0.0
FileDescription: QQ2020
Translation: 0x0804 0x04b0

Hiloti.2 also known as:

BkavW32.AIDetectVM.malware
MicroWorld-eScanGen:Variant.Hiloti.2
FireEyeGeneric.mg.27c54f9295ca4da9
Qihoo-360Generic/HEUR/QVM07.1.C266.Malware.Gen
McAfeeArtemis!27C54F9295CA
CylanceUnsafe
K7AntiVirusTrojan ( 00521b151 )
BitDefenderGen:Variant.Hiloti.2
K7GWTrojan ( 00521b151 )
Cybereasonmalicious.295ca4
BitDefenderThetaGen:NN.ZexaF.34106.@r0@aOrhVicb
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Packed.BlackMoon.A potentially unwanted
GDataGen:Variant.Hiloti.2
KasperskyUDS:DangerousObject.Multi.Generic
TencentWin32.Backdoor.Bp-generic.Ptem
Ad-AwareGen:Variant.Hiloti.2
Invinceaheuristic
McAfee-GW-EditionBehavesLike.Win32.Sality.tc
SentinelOneDFI – Malicious PE
Trapminemalicious.high.ml.score
EmsisoftGen:Variant.Hiloti.2 (B)
APEXMalicious
Endgamemalicious (high confidence)
ArcabitTrojan.Hiloti.2
ZoneAlarmUDS:DangerousObject.Multi.Generic
MicrosoftTrojan:Win32/Wacatac.D!ml
Acronissuspicious
ALYacGen:Variant.Hiloti.2
MAXmalware (ai score=86)
VBA32BScope.Trojan.Wacatac
RisingMalware.Heuristic!ET#79% (RDMK:cmRtazr1AhwoSB08s9fdYqGd3s9k)
IkarusTrojan.Win32.Injector
eGambitUnsafe.AI_Score_100%
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Hiloti.2?

Hiloti.2 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment