<Drive name for removable media>:\fil_20060629111052.exe
<Drive name for removable media>:\rcxc535.tmp
<Drive name for removable media>:\rcxc515.tmp
<Drive name for removable media>:\rcxc4f5.tmp
<Drive name for removable media>:\7790_preview.exe
<Drive name for removable media>:\2015-02-patients-topic-work-related-asthma-jobs.exe
<Drive name for removable media>:\rcxd956.tmp
<Drive name for removable media>:\cleanlyrics.exe
<Drive name for removable media>:\rcxde87.tmp
<Drive name for removable media>:\rcx469.tmp
<Drive name for removable media>:\removedtitles_records.exe
<Drive name for removable media>:\rcxffa6.tmp
<Drive name for removable media>:\rcxff85.tmp
<Drive name for removable media>:\babyboymaintoscenesbackground.exe
<Drive name for removable media>:\rcxf880.tmp
<Drive name for removable media>:\rcxf85f.tmp
<Drive name for removable media>:\babyboymaintonotesbackground_pal.exe
<Drive name for removable media>:\rcxf467.tmp
<Drive name for removable media>:\rcxf446.tmp
<Drive name for removable media>:\flower_trans_matte.exe
<Drive name for removable media>:\rcxf03e.tmp
<Drive name for removable media>:\bg_search_box.exe
<Drive name for removable media>:\rcxec46.tmp
<Drive name for removable media>:\asm.exe
<Drive name for removable media>:\rcxe743.tmp
<Drive name for removable media>:\breakpoint.exe
<Drive name for removable media>:\rcxe2dd.tmp
<Drive name for removable media>:\block.exe
<Drive name for removable media>:\rcxbfe3.tmp
<Drive name for removable media>:\rcxe0f.tmp
<Drive name for removable media>:\rcxbfc3.tmp
<Drive name for removable media>:\rcxbac0.tmp
<Drive name for removable media>:\rcx8922.tmp
<Drive name for removable media>:\coffee.exe
<Drive name for removable media>:\rcx83a3.tmp
<Drive name for removable media>:\dialmap.exe
<Drive name for removable media>:\rcx7e91.tmp
<Drive name for removable media>:\default.exe
<Drive name for removable media>:\rcx7604.tmp
<Drive name for removable media>:\dashborder_120.exe
<Drive name for removable media>:\dashborder_144.exe
<Drive name for removable media>:\rcx71ec.tmp
<Drive name for removable media>:\archer.exe
<Drive name for removable media>:\rcx6db4.tmp
<Drive name for removable media>:\rcx6da4.tmp
<Drive name for removable media>:\join.exe
<Drive name for removable media>:\rcx699b.tmp
<Drive name for removable media>:\rcx5f2a.tmp
<Drive name for removable media>:\split.exe
<Drive name for removable media>:\coinoun.exe
<Drive name for removable media>:\rcx71cc.tmp
<Drive name for removable media>:\rcx8d2a.tmp
<Drive name for removable media>:\dashborder_192.exe
<Drive name for removable media>:\rcx950b.tmp
<Drive name for removable media>:\region-north-karelia.exe
<Drive name for removable media>:\rcxb5ed.tmp
<Drive name for removable media>:\13.exe
<Drive name for removable media>:\rcxb148.tmp
<Drive name for removable media>:\pushkin.exe
<Drive name for removable media>:\rcxac46.tmp
<Drive name for removable media>:\3.exe
<Drive name for removable media>:\rcxa744.tmp
<Drive name for removable media>:\rcxa724.tmp
<Drive name for removable media>:\rcxa6f4.tmp
<Drive name for removable media>:\cveuropeo.exe
<Drive name for removable media>:\rcxa1c3.tmp
<Drive name for removable media>:\rcxa1a2.tmp
<Drive name for removable media>:\rcxa192.tmp
<Drive name for removable media>:\ovp25012015.exe
<Drive name for removable media>:\rcx9c90.tmp
<Drive name for removable media>:\rcx9c7f.tmp
<Drive name for removable media>:\rcx9c5f.tmp
<Drive name for removable media>:\lisp_success.exe
<Drive name for removable media>:\clip_480_5sec_6mbps_h264.exe
<Drive name for removable media>:\rcx1311.tmp
Malicious functions
To complicate detection of its presence in the operating system,
forces the system hide from view:
hidden files
Modifies file system
Creates the following files
%HOMEPATH%\coinoun.exe
Sets the 'hidden' attribute to the following files
%HOMEPATH%\coinoun.exe
<Drive name for removable media>:\autorun.inf
<Drive name for removable media>:\coinoun.exe
Network activity
Connects to
'255.255.255.255':8000
UDP
DNS ASK ns#.##opsuwey.com
DNS ASK ns#.##opsuwey.net
DNS ASK ns#.##opsuwey.org
DNS ASK ns#.##opsuwey.biz
DNS ASK ns#.##opsuwey.info
Miscellaneous
Creates and executes the following
'%HOMEPATH%\coinoun.exe'
Scaricate Dr.Web per Android
Gratis per 3 mesi
Tutti i componenti di protezione
Rinnovo versione di prova tramite AppGallery/Google Pay
Continuando a utilizzare questo sito, l'utente acconsente al nostro utilizzo di file Cookie e di altre tecnologie per la raccolta di informazioni statistiche sui visitatori. Per maggiori informazioni