To complicate detection of its presence in the operating system,
forces the system hide from view:
hidden files
Modifies file system :
Creates the following files:
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\cmd[1].txt
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\cmd[1].txt
%TEMP%\chrome.exe
Sets the 'hidden' attribute to the following files:
<Drive name for removable media>:\Autorun.inf
<Drive name for removable media>:\chrome.exe
<Full path to virus>
%TEMP%\chrome.exe
Deletes the following files:
<SYSTEM32>\PerfStringBackup.TMP
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\cmd[1].txt
<SYSTEM32>\wbem\Performance\WmiApRpl.ini
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\cmd[1].txt
Network activity:
Connects to:
'ay####a.no-ip.org':80
TCP:
HTTP GET requests:
ay####a.no-ip.org/cmd.txt
UDP:
DNS ASK ay####a.no-ip.org
Scaricate Dr.Web per Android
Gratis per 3 mesi
Tutti i componenti di protezione
Rinnovo versione di prova tramite AppGallery/Google Pay
Continuando a utilizzare questo sito, l'utente acconsente al nostro utilizzo di file Cookie e di altre tecnologie per la raccolta di informazioni statistiche sui visitatori. Per maggiori informazioni