<Drive name for removable media>:\Indian girl.avi.exe
<Drive name for removable media>:\5710451.exe
Malicious functions:
To complicate detection of its presence in the operating system,
blocks the following features:
User Account Control (UAC)
Executes the following:
'%WINDIR%\x3e6c.exe'
'<SYSTEM32>\cmd.exe' /c %WINDIR%\x3e6c.exe
'%WINDIR%\4228b.exe'
Terminates or attempts to terminate
the following system processes:
<SYSTEM32>\cmd.exe
the following user processes:
ecmd.exe
Modifies file system:
Creates the following files:
%WINDIR%\x3e6c.exe
%WINDIR%\9d6x6.exe
%TEMP%\~DFD54F.tmp
%TEMP%\~DFA14A.tmp
%WINDIR%\4228b.exe
Sets the 'hidden' attribute to the following files:
<Drive name for removable media>:\autorun.inf
<Drive name for removable media>:\5710451.exe
Deletes the following files:
%TEMP%\~DFA14A.tmp
Network activity:
Connects to:
'me##0.org':80
'77##d.info':80
TCP:
HTTP GET requests:
http://me##0.org/generic/host.php
http://77##d.info/generic/host.php
UDP:
DNS ASK me##0.org
DNS ASK 77##d.info
Scaricate Dr.Web per Android
Gratis per 3 mesi
Tutti i componenti di protezione
Rinnovo versione di prova tramite AppGallery/Google Pay
Continuando a utilizzare questo sito, l'utente acconsente al nostro utilizzo di file Cookie e di altre tecnologie per la raccolta di informazioni statistiche sui visitatori. Per maggiori informazioni