{"id":56939,"date":"2022-08-26T09:47:57","date_gmt":"2022-08-26T09:47:57","guid":{"rendered":"https:\/\/harchi90.com\/ransomware-actor-abuses-genshin-impact-anti-cheat-driver-to-kill-antivirus\/"},"modified":"2022-08-26T09:47:57","modified_gmt":"2022-08-26T09:47:57","slug":"ransomware-actor-abuses-genshin-impact-anti-cheat-driver-to-kill-antivirus","status":"publish","type":"post","link":"https:\/\/harchi90.com\/ransomware-actor-abuses-genshin-impact-anti-cheat-driver-to-kill-antivirus\/","title":{"rendered":"Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill Antivirus"},"content":{"rendered":"
\n

the mhyprot2.sys<\/i> driver that was found in this sequence was the one built in August 2020. Going back to social media streams, we can see that shortly after Genshin Impact was released in September 2020, this module was discussed in the gaming community because it was not removed even after the game was uninstalled and because it allowed bypassing of privileges.<\/p>\n

A PoC, provided by user kagurazakasanae, showed that a library terminated 360 Total Security. A more comprehensive PoC, provided by Kento Oki, had the following capabilities:<\/p>\n