<Drive name for removable media>:\sex video +18.avi.lnk
<Drive name for removable media>:\msi.exe
Malicious functions:
Creates and executes the following:
'%TEMP%\msn.EXE'
'%TEMP%\msn.EXE' (downloaded from the Internet)
Modifies file system :
Creates the following files:
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\blob[1]
%TEMP%\msn.EXE
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\blob[1]
%TEMP%\yahoo
%TEMP%\hiihdeb
%TEMP%\aut1.tmp
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\blob[1]
%TEMP%\msi.EXE
Sets the 'hidden' attribute to the following files:
%HOMEPATH%\Start Menu\Programs\Startup\yahoo.lnk
<Drive name for removable media>:\msi.exe
%TEMP%\msn.EXE
%HOMEPATH%\Start Menu\Programs\Startup\msn.lnk
Deletes the following files:
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\blob[1]
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\blob[1]
%TEMP%\aut1.tmp
%TEMP%\hiihdeb
Network activity:
Connects to:
'ge.tt':80
TCP:
HTTP GET requests:
ge.tt/api/1/files/4hdD4JV/0/blob?do######
ge.tt/api/1/files/7Yi6dqU/2/blob?do######
UDP:
DNS ASK ge.tt
Miscellaneous:
Searches for the following windows:
ClassName: 'Indicator' WindowName: ''
ClassName: 'Shell_TrayWnd' WindowName: ''
Descargue Dr.Web para Android
Gratis por 3 meses
Todos los componentes de protección
Renovación de la demo a través de AppGallery/Google Pay
Si Vd. continúa usando este sitio web, esto significa que Vd. acepta el uso de archivos Cookie y otras tecnologías para que recabemos las estadísticas sobre los visitantes. Más información