<Drive name for removable media>:\{user-egregregerfwde}\svhost.exe
<Drive name for removable media>:\contosoroot_1.cer.lnk
<Drive name for removable media>:\{user-egregregerfwde}\contosoroot_1.cer
<Drive name for removable media>:\dashborder_192.bmp.lnk
<Drive name for removable media>:\{user-egregregerfwde}\dashborder_192.bmp
<Drive name for removable media>:\dashborder_144.bmp.lnk
<Drive name for removable media>:\{user-egregregerfwde}\dashborder_144.bmp
<Drive name for removable media>:\dialmap.bmp.lnk
<Drive name for removable media>:\{user-egregregerfwde}\dialmap.bmp
<Drive name for removable media>:\tileimage.bmp.lnk
<Drive name for removable media>:\{user-egregregerfwde}\tileimage.bmp
<Drive name for removable media>:\{user-egregregerfwde}\testee.cer
<Drive name for removable media>:\default.bmp.lnk
<Drive name for removable media>:\dashborder_96.bmp.lnk
<Drive name for removable media>:\{user-egregregerfwde}\dashborder_96.bmp
<Drive name for removable media>:\join.avi.lnk
<Drive name for removable media>:\{user-egregregerfwde}\join.avi
<Drive name for removable media>:\000814251_video_01.avi.lnk
<Drive name for removable media>:\{user-egregregerfwde}\000814251_video_01.avi
<Drive name for removable media>:\split.avi.lnk
<Drive name for removable media>:\svhost.exe
<Drive name for removable media>:\{user-egregregerfwde}\split.avi
<Drive name for removable media>:\autorun.inf
<Drive name for removable media>:\{user-egregregerfwde}\default.bmp
<Drive name for removable media>:\testee.cer.lnk
Malicious functions
Injects code into
the following system processes:
%WINDIR%\explorer.exe
the following user processes:
winhost.exe
Modifies file system
Creates the following files
%TEMP%\winhost.exe
Sets the 'hidden' attribute to the following files
%APPDATA%\svhost.exe
<Drive name for removable media>:\{user-egregregerfwde}\svhost.exe
<Drive name for removable media>:\autorun.inf
<Drive name for removable media>:\svhost.exe
Moves the following files
from %TEMP%\winhost.exe to %APPDATA%\svhost.exe
Network activity
UDP
DNS ASK de#####ize.sdeirc.net
Miscellaneous
Creates and executes the following
'%TEMP%\winhost.exe'
Scaricate Dr.Web per Android
Gratis per 3 mesi
Tutti i componenti di protezione
Rinnovo versione di prova tramite AppGallery/Google Pay
Continuando a utilizzare questo sito, l'utente acconsente al nostro utilizzo di file Cookie e di altre tecnologie per la raccolta di informazioni statistiche sui visitatori. Per maggiori informazioni