<Drive name for removable media>:\sex video +18.avi.lnk
<Drive name for removable media>:\msi.exe
Malicious functions:
Creates and executes the following:
'%TEMP%\msn.EXE'
'%TEMP%\msn.EXE' (downloaded from the Internet)
Modifies file system :
Creates the following files:
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\blob[1]
%TEMP%\msn.EXE
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\blob[1]
%TEMP%\yahoo
%TEMP%\hiihdeb
%TEMP%\aut1.tmp
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\blob[1]
%TEMP%\msi.EXE
Sets the 'hidden' attribute to the following files:
%HOMEPATH%\Start Menu\Programs\Startup\yahoo.lnk
<Drive name for removable media>:\msi.exe
%TEMP%\msn.EXE
%HOMEPATH%\Start Menu\Programs\Startup\msn.lnk
Deletes the following files:
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\blob[1]
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\blob[1]
%TEMP%\aut1.tmp
%TEMP%\hiihdeb
Network activity:
Connects to:
'ge.tt':80
TCP:
HTTP GET requests:
ge.tt/api/1/files/4hdD4JV/0/blob?do######
ge.tt/api/1/files/7Yi6dqU/2/blob?do######
UDP:
DNS ASK ge.tt
Miscellaneous:
Searches for the following windows:
ClassName: 'Indicator' WindowName: ''
ClassName: 'Shell_TrayWnd' WindowName: ''
Scaricate Dr.Web per Android
Gratis per 3 mesi
Tutti i componenti di protezione
Rinnovo versione di prova tramite AppGallery/Google Pay
Continuando a utilizzare questo sito, l'utente acconsente al nostro utilizzo di file Cookie e di altre tecnologie per la raccolta di informazioni statistiche sui visitatori. Per maggiori informazioni