C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\8PI70DM3\desktop.ini
C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\YN7RD19E\desktop.ini
C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\UP6P0HKP\desktop.ini
C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\RJBUV52Y\desktop.ini
%TEMP%\1.tmp
%WINDIR%\Temp\2.tmp
Sets the 'hidden' attribute to the following files:
C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\YN7RD19E\desktop.ini
C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\UP6P0HKP\desktop.ini
C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\RJBUV52Y\desktop.ini
C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\8PI70DM3\desktop.ini
Deletes the following files:
%WINDIR%\Temp\2.tmp
%TEMP%\1.tmp
Moves the following system files:
from <SYSTEM32>\spoolsv.exe to %WINDIR%\Temp\4.tmp
Moves the following files:
from <SYSTEM32>\dllcache\spoolsv.exe.new to <SYSTEM32>\dllcache\spoolsv.exe
Moves itself:
from <Full path to virus> to %TEMP%\3.tmp
Network activity:
Connects to:
'ru####kumoet.com':8080
'4s##rs.com':80
TCP:
HTTP GET requests:
4s##rs.com/task/
UDP:
DNS ASK ru####kumoet.com
DNS ASK 4s##rs.com
Scaricate Dr.Web per Android
Gratis per 3 mesi
Tutti i componenti di protezione
Rinnovo versione di prova tramite AppGallery/Google Pay
Continuando a utilizzare questo sito, l'utente acconsente al nostro utilizzo di file Cookie e di altre tecnologie per la raccolta di informazioni statistiche sui visitatori. Per maggiori informazioni