'%TEMP%\hsadjku.exe' (downloaded from the Internet)
'%TEMP%\dw3re.exe' (downloaded from the Internet)
'%TEMP%\yhtdayrg.exe' (downloaded from the Internet)
'%TEMP%\ksaduytr.exe' (downloaded from the Internet)
'%TEMP%\kusadtylds.exe' (downloaded from the Internet)
Modifies file system :
Creates the following files:
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\bnew[1].exe
%TEMP%\ksaduytr.exe
%TEMP%\hsadjku.exe
%TEMP%\dw3re.exe
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\dqnew[1].exe
%TEMP%\kusadtylds.exe
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\zpm[1].exe
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\bet[1].exe
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\ng[1].exe
%TEMP%\yhtdayrg.exe
Deletes the following files:
%TEMP%\ksaduytr.exe
%TEMP%\hsadjku.exe
%TEMP%\kusadtylds.exe
%TEMP%\yhtdayrg.exe
Network activity:
Connects to:
'54.##1.185.232':80
'localhost':1035
TCP:
HTTP GET requests:
54.##1.185.232/bnew.exe
54.##1.185.232/dqnew.exe
54.##1.185.232/ng.exe
54.##1.185.232/zpm.exe
54.##1.185.232/bet.exe
Scaricate Dr.Web per Android
Gratis per 3 mesi
Tutti i componenti di protezione
Rinnovo versione di prova tramite AppGallery/Google Pay
Continuando a utilizzare questo sito, l'utente acconsente al nostro utilizzo di file Cookie e di altre tecnologie per la raccolta di informazioni statistiche sui visitatori. Per maggiori informazioni