Mi biblioteca
Mi biblioteca

+ Añadir a la biblioteca

Soporte
Soporte 24 horas | Normas de contactar

Sus solicitudes

Perfil

Trojan.MulDrop7.15895

Added to the Dr.Web virus database: 2017-02-04

Virus description added:

Technical Information

To ensure autorun and distribution:
Creates the following files on removable media:
  • <Drive name for removable media>:\МФ±¦НшВтјТ№єОпЦъКЦ(ВМЙ«Гв°ІЧ°°ж).exe
Malicious functions:
Executes the following:
  • '%ProgramFiles%\UUCSSS\ModBNAMEVVK.exe'
Modifies file system:
Creates the following files:
  • %APPDATA%\42467\БґЅУ\°Щ¶ИЛСЛч.url
  • %APPDATA%\42467\БґЅУ\GoogleЛСЛч.url
  • %APPDATA%\42467\БґЅУ\4399РЎУОП·.url
  • %APPDATA%\42467\БґЅУ\МФ±¦Нш.url
  • %APPDATA%\42467\БґЅУ\ИИГЕУОП·.url
  • %APPDATA%\42467\БґЅУ\іЈУГІйСЇ.url
  • %APPDATA%\42467\УйАЦ\УЕїбКУЖµ.url
  • %APPDATA%\42467\УйАЦ\ЖрµгЦРОДНш.url
  • %APPDATA%\42467\УйАЦ\В№¶¦јЗ.url
  • %APPDATA%\42467\УйАЦ\17173НшУОГЕ»§.url
  • %APPDATA%\42467\УйАЦ\ЛСєьУйАЦ.url
  • %APPDATA%\42467\УйАЦ\ЛСєьёЯЗеУ°КУѕз.url
  • %APPDATA%\42467\УйАЦ\ЛС№·ТфАЦ.url
  • %APPDATA%\42467\БґЅУ\ІЖѕ­\ЦР№ъЦ¤ИЇНш.url
  • %APPDATA%\42467\БґЅУ\ІЖѕ­\Ц¤ИЇЦ®РЗ.url
  • %APPDATA%\42467\БґЅУ\ІЖѕ­\РВАЛІЖѕ­.url
  • %APPDATA%\42467\БґЅУ\№¤ѕЯ\№Иёи·­Тл.url
  • %APPDATA%\42467\БґЅУ\№¤ѕЯ\°Щ¶ИЛСЛч.url
  • %APPDATA%\42467\БґЅУ\ІЖѕ­\ЦРЅрФЪПЯ.url
  • %APPDATA%\42467\БґЅУ\ІЖѕ­\ЛСєьІЖѕ­.url
  • %APPDATA%\42467\БґЅУ\НшЦ·ґуИ«.url
  • %APPDATA%\42467\БґЅУ\НшЙП№єОп.url
  • %APPDATA%\42467\БґЅУ\НБ¶№НшµзУ°.url
  • %APPDATA%\42467\БґЅУ\ІЖѕ­\ЅрИЪЅз.url
  • %APPDATA%\42467\БґЅУ\ІЖѕ­\єНС¶Нш.url
  • %APPDATA%\42467\БґЅУ\ІЖѕ­\¶«·ЅІЖё»Нш.url
  • %APPDATA%\42467\Йъ»о\ЧїФЅНш.url
  • %APPDATA%\42467\ГЕ»§\РВАЛРВОЕ.url
  • %APPDATA%\42467\ГЕ»§\РВАЛНш.url
  • %APPDATA%\42467\ГЕ»§\НшТЧ.url
  • %APPDATA%\42467\ЙзЗш\їЄРДНш.url
  • %APPDATA%\42467\ЙзЗш\°Щ¶ИМщ°Й.url
  • %APPDATA%\42467\ЙзЗш\chinarenЙзЗш.url
  • %APPDATA%\42467\ГЕ»§\МмБъ°ЛІї.url
  • %APPDATA%\42467\ГЕ»§\QQ.com.url
  • %APPDATA%\42467\№¤ѕЯ\МмїХИнјюХѕ.url
  • %APPDATA%\42467\№¤ѕЯ\ЛСєьУКПд.url
  • %APPDATA%\42467\ГЕ»§\МЪС¶РВОЕ.url
  • %APPDATA%\42467\ГЕ»§\ЛСєьРВОЕ.url
  • %APPDATA%\42467\ГЕ»§\ЛСєьНш.url
  • %APPDATA%\42467\Йъ»о\ЛСєьЖыіµ.url
  • %APPDATA%\42467\Йъ»о\ЛС·їНш.url
  • %APPDATA%\42467\Йъ»о\КЦ»ъЦ®јТ.url
  • %APPDATA%\42467\Йъ»о\ЦР»ЄУўІЕНш.url
  • %APPDATA%\42467\Йъ»о\ЦЗБЄХРЖёНш.url
  • %APPDATA%\42467\Йъ»о\МФ±¦Нш.url
  • %APPDATA%\42467\Йъ»о\ѕ©¶«ЙМіЗ.url
  • %APPDATA%\42467\ЙзЗш\ЛСєьЙзЗш.url
  • %APPDATA%\42467\ЙзЗш\ЛСєьІ©їН.url
  • %APPDATA%\42467\ЙзЗш\ЛС№·Лµ°Й.url
  • %APPDATA%\42467\Йъ»о\Ѕ№µг·їµШІъНш.url
  • %APPDATA%\42467\ЙзЗш\РЈДЪНш.url
  • %APPDATA%\42467\ЙзЗш\МмСДЙзЗш.url
  • %APPDATA%\42467\БґЅУ\УйАЦ\ЛСєьУйАЦ.url
  • %APPDATA%\42467\БґЅУ\УйАЦ\ЛСєьёЯЗеУ°КУѕз.url
  • %APPDATA%\42467\БґЅУ\УйАЦ\ЛС№·ТфАЦ.url
  • %ProgramFiles%\USER_FILES\2.ico
  • %ProgramFiles%\USER_FILES\1.ico
  • %APPDATA%\42467\БґЅУ\УйАЦ\УЕїбКУЖµ.url
  • %APPDATA%\42467\БґЅУ\УйАЦ\ЖрµгЦРОДНш.url
  • %APPDATA%\42467\БґЅУ\Йъ»о\ЦР»ЄУўІЕНш.url
  • %APPDATA%\42467\БґЅУ\Йъ»о\ЦЗБЄХРЖёНш.url
  • %APPDATA%\42467\БґЅУ\Йъ»о\МФ±¦Нш.url
  • %APPDATA%\42467\БґЅУ\УйАЦ\В№¶¦јЗ.url
  • %APPDATA%\42467\БґЅУ\УйАЦ\17173НшУОГЕ»§.url
  • %APPDATA%\42467\БґЅУ\Йъ»о\ЧїФЅНш.url
  • %HOMEPATH%\42467\МФ±¦№єОп.lnk
  • %ProgramFiles%\USER_FILES\ПВФШёЯЗеУ°КУІҐ·ЕЖч.url
  • %ProgramFiles%\USER_FILES\НшЦ·µјєЅ.url
  • %HOMEPATH%\42467\ИИГЕУОП·.lnk
  • %HOMEPATH%\42467\НшЦ·µјєЅ.lnk
  • %HOMEPATH%\42467\НБ¶№НшµзУ°.lnk
  • %ProgramFiles%\USER_FILES\НБ¶№НшµзУ°.url
  • %ProgramFiles%\USER_FILES\5.ico
  • %ProgramFiles%\USER_FILES\4.ico
  • %ProgramFiles%\USER_FILES\3.ico
  • %ProgramFiles%\USER_FILES\МФ±¦Нш.url
  • %ProgramFiles%\USER_FILES\ИИГЕУОП·.url
  • %ProgramFiles%\USER_FILES\6.ico
  • %APPDATA%\42467\БґЅУ\Йъ»о\ЛСєьЖыіµ.url
  • %APPDATA%\42467\БґЅУ\ГЕ»§\МЪС¶РВОЕ.url
  • %APPDATA%\42467\БґЅУ\ГЕ»§\ЛСєьРВОЕ.url
  • %APPDATA%\42467\БґЅУ\ГЕ»§\ЛСєьНш.url
  • %APPDATA%\42467\БґЅУ\ГЕ»§\РВАЛНш.url
  • %APPDATA%\42467\БґЅУ\ГЕ»§\НшТЧ.url
  • %APPDATA%\42467\БґЅУ\ГЕ»§\МмБъ°ЛІї.url
  • %APPDATA%\42467\БґЅУ\ГЕ»§\QQ.com.url
  • %APPDATA%\42467\БґЅУ\№¤ѕЯ\ЛС№·µШНј.url
  • %APPDATA%\42467\БґЅУ\№¤ѕЯ\»ЄѕьИнјюФ°.url
  • %APPDATA%\42467\БґЅУ\№¤ѕЯ\№ИёиЛСЛч.url
  • %APPDATA%\42467\БґЅУ\№¤ѕЯ\МмїХИнјюХѕ.url
  • %APPDATA%\42467\БґЅУ\№¤ѕЯ\ЛСєьУКПд.url
  • %APPDATA%\42467\БґЅУ\№¤ѕЯ\ЛС№·ЛСЛч.url
  • %APPDATA%\42467\БґЅУ\Йъ»о\Ѕ№µг·їµШІъНш.url
  • %APPDATA%\42467\БґЅУ\ЙзЗш\РЈДЪНш.url
  • %APPDATA%\42467\БґЅУ\ЙзЗш\МмСДЙзЗш.url
  • %APPDATA%\42467\БґЅУ\Йъ»о\ЛС·їНш.url
  • %APPDATA%\42467\БґЅУ\Йъ»о\КЦ»ъЦ®јТ.url
  • %APPDATA%\42467\БґЅУ\Йъ»о\ѕ©¶«ЙМіЗ.url
  • %APPDATA%\42467\БґЅУ\ЙзЗш\ЛСєьЙзЗш.url
  • %APPDATA%\42467\БґЅУ\ЙзЗш\°Щ¶ИМщ°Й.url
  • %APPDATA%\42467\БґЅУ\ЙзЗш\chinarenЙзЗш.url
  • %APPDATA%\42467\БґЅУ\ГЕ»§\РВАЛРВОЕ.url
  • %APPDATA%\42467\БґЅУ\ЙзЗш\ЛСєьІ©їН.url
  • %APPDATA%\42467\БґЅУ\ЙзЗш\ЛС№·Лµ°Й.url
  • %APPDATA%\42467\БґЅУ\ЙзЗш\їЄРДНш.url
  • %APPDATA%\42467\№¤ѕЯ\ЛС№·ЛСЛч.url
  • C:\USER_FILES\іЈУГНшЦ·\ЙзЗш\їЄРДНш.url
  • C:\USER_FILES\іЈУГНшЦ·\ЙзЗш\°Щ¶ИМщ°Й.url
  • C:\USER_FILES\іЈУГНшЦ·\ЙзЗш\chinarenЙзЗш.url
  • C:\USER_FILES\іЈУГНшЦ·\ЙзЗш\ЛСєьЙзЗш.url
  • C:\USER_FILES\іЈУГНшЦ·\ЙзЗш\ЛСєьІ©їН.url
  • C:\USER_FILES\іЈУГНшЦ·\ЙзЗш\ЛС№·Лµ°Й.url
  • C:\USER_FILES\іЈУГНшЦ·\ГЕ»§\РВАЛРВОЕ.url
  • C:\USER_FILES\іЈУГНшЦ·\ГЕ»§\МЪС¶РВОЕ.url
  • C:\USER_FILES\іЈУГНшЦ·\ГЕ»§\ЛСєьРВОЕ.url
  • C:\USER_FILES\іЈУГНшЦ·\ГЕ»§\ЛСєьНш.url
  • C:\USER_FILES\іЈУГНшЦ·\ГЕ»§\РВАЛНш.url
  • C:\USER_FILES\іЈУГНшЦ·\ГЕ»§\НшТЧ.url
  • C:\USER_FILES\іЈУГНшЦ·\ГЕ»§\МмБъ°ЛІї.url
  • C:\USER_FILES\іЈУГНшЦ·\Йъ»о\ЦР»ЄУўІЕНш.url
  • C:\USER_FILES\іЈУГНшЦ·\Йъ»о\ЦЗБЄХРЖёНш.url
  • C:\USER_FILES\іЈУГНшЦ·\Йъ»о\МФ±¦Нш.url
  • C:\USER_FILES\іЈУГНшЦ·\УйАЦ\В№¶¦јЗ.url
  • C:\USER_FILES\іЈУГНшЦ·\УйАЦ\17173НшУОГЕ»§.url
  • C:\USER_FILES\іЈУГНшЦ·\Йъ»о\ЧїФЅНш.url
  • C:\USER_FILES\іЈУГНшЦ·\Йъ»о\ЛСєьЖыіµ.url
  • C:\USER_FILES\іЈУГНшЦ·\Йъ»о\Ѕ№µг·їµШІъНш.url
  • C:\USER_FILES\іЈУГНшЦ·\ЙзЗш\РЈДЪНш.url
  • C:\USER_FILES\іЈУГНшЦ·\ЙзЗш\МмСДЙзЗш.url
  • C:\USER_FILES\іЈУГНшЦ·\Йъ»о\ЛС·їНш.url
  • C:\USER_FILES\іЈУГНшЦ·\Йъ»о\КЦ»ъЦ®јТ.url
  • C:\USER_FILES\іЈУГНшЦ·\Йъ»о\ѕ©¶«ЙМіЗ.url
  • C:\USER_FILES\іЈУГНшЦ·\ГЕ»§\QQ.com.url
  • C:\USER_FILES\НшЦ·ґуИ«.url
  • C:\USER_FILES\НшЙП№єОп.url
  • C:\USER_FILES\НБ¶№НшµзУ°.url
  • C:\USER_FILES\іЈУГНшЦ·\ІЖѕ­\ЅрИЪЅз.url
  • C:\USER_FILES\іЈУГНшЦ·\ІЖѕ­\єНС¶Нш.url
  • C:\USER_FILES\іЈУГНшЦ·\ІЖѕ­\¶«·ЅІЖё»Нш.url
  • C:\USER_FILES\МФ±¦Нш.url
  • C:\USER_FILES\GoogleЛСЛч.url
  • C:\USER_FILES\4399РЎУОП·.url
  • %ProgramFiles%\UUCSSS\ModBNAMEVVK.exe
  • C:\USER_FILES\ИИГЕУОП·.url
  • C:\USER_FILES\іЈУГІйСЇ.url
  • C:\USER_FILES\°Щ¶ИЛСЛч.url
  • C:\USER_FILES\іЈУГНшЦ·\№¤ѕЯ\ЛС№·µШНј.url
  • C:\USER_FILES\іЈУГНшЦ·\№¤ѕЯ\»ЄѕьИнјюФ°.url
  • C:\USER_FILES\іЈУГНшЦ·\№¤ѕЯ\№ИёиЛСЛч.url
  • C:\USER_FILES\іЈУГНшЦ·\№¤ѕЯ\МмїХИнјюХѕ.url
  • C:\USER_FILES\іЈУГНшЦ·\№¤ѕЯ\ЛСєьУКПд.url
  • C:\USER_FILES\іЈУГНшЦ·\№¤ѕЯ\ЛС№·ЛСЛч.url
  • C:\USER_FILES\іЈУГНшЦ·\№¤ѕЯ\№Иёи·­Тл.url
  • C:\USER_FILES\іЈУГНшЦ·\ІЖѕ­\Ц¤ИЇЦ®РЗ.url
  • C:\USER_FILES\іЈУГНшЦ·\ІЖѕ­\РВАЛІЖѕ­.url
  • C:\USER_FILES\іЈУГНшЦ·\ІЖѕ­\ЛСєьІЖѕ­.url
  • C:\USER_FILES\іЈУГНшЦ·\№¤ѕЯ\°Щ¶ИЛСЛч.url
  • C:\USER_FILES\іЈУГНшЦ·\ІЖѕ­\ЦРЅрФЪПЯ.url
  • C:\USER_FILES\іЈУГНшЦ·\ІЖѕ­\ЦР№ъЦ¤ИЇНш.url
  • %APPDATA%\42467\МФ±¦Нш.url
  • %APPDATA%\42467\ИИГЕУОП·.url
  • %APPDATA%\42467\іЈУГІйСЇ.url
  • %APPDATA%\42467\НшЦ·ґуИ«.url
  • %APPDATA%\42467\НшЙП№єОп.url
  • %APPDATA%\42467\НБ¶№НшµзУ°.url
  • %APPDATA%\42467\°Щ¶ИЛСЛч.url
  • %APPDATA%\42467\Links\Windows Media.url
  • %APPDATA%\42467\Links\Windows Marketplace.url
  • %APPDATA%\42467\Links\Free Hotmail.url
  • %APPDATA%\42467\GoogleЛСЛч.url
  • %APPDATA%\42467\4399РЎУОП·.url
  • %APPDATA%\42467\Links\Windows.url
  • %APPDATA%\42467\№¤ѕЯ\№Иёи·­Тл.url
  • %APPDATA%\42467\№¤ѕЯ\°Щ¶ИЛСЛч.url
  • %APPDATA%\42467\ІЖѕ­\ЦРЅрФЪПЯ.url
  • %APPDATA%\42467\№¤ѕЯ\ЛС№·µШНј.url
  • %APPDATA%\42467\№¤ѕЯ\»ЄѕьИнјюФ°.url
  • %APPDATA%\42467\№¤ѕЯ\№ИёиЛСЛч.url
  • %APPDATA%\42467\ІЖѕ­\ЦР№ъЦ¤ИЇНш.url
  • %APPDATA%\42467\ІЖѕ­\ЅрИЪЅз.url
  • %APPDATA%\42467\ІЖѕ­\єНС¶Нш.url
  • %APPDATA%\42467\ІЖѕ­\¶«·ЅІЖё»Нш.url
  • %APPDATA%\42467\ІЖѕ­\Ц¤ИЇЦ®РЗ.url
  • %APPDATA%\42467\ІЖѕ­\РВАЛІЖѕ­.url
  • %APPDATA%\42467\ІЖѕ­\ЛСєьІЖѕ­.url
  • %APPDATA%\42467\Links\Customize Links.url
  • %APPDATA%\SogouExplorer\Favorite2.dat
  • %APPDATA%\SogouExplorer\CommCfg.xml
  • %APPDATA%\SogouExplorer\configlocal.xml
  • %APPDATA%\Tencent\TencentTraveler\100\TtConf.dat
  • C:\Downloads\МФ±¦НшВтјТ№єОпЦъКЦ(ВМЙ«Гв°ІЧ°°ж).exe
  • %HOMEPATH%\Start Menu\МФ±¦НшВтјТ№єОпЦъКЦ(ВМЙ«Гв°ІЧ°°ж).exe
  • %APPDATA%\SogouExplorer\config.xml
  • C:\USER_FILES\іЈУГНшЦ·\УйАЦ\ЛСєьёЯЗеУ°КУѕз.url
  • C:\USER_FILES\іЈУГНшЦ·\УйАЦ\ЛС№·ТфАЦ.url
  • C:\USER_FILES\іЈУГНшЦ·\УйАЦ\ЖрµгЦРОДНш.url
  • %APPDATA%\360se\data\360sefav.db
  • C:\USER_FILES\іЈУГНшЦ·\УйАЦ\УЕїбКУЖµ.url
  • C:\USER_FILES\іЈУГНшЦ·\УйАЦ\ЛСєьУйАЦ.url
  • %TEMP%\nsj2.tmp\nsRandom.dll
  • %APPDATA%\Opera\Opera\search.ini
  • %APPDATA%\Apple Computer\Safari\Bookmarks.plist
  • %APPDATA%\42467\Radio Station Guide.url
  • %APPDATA%\42467\MSN.com.url
  • %APPDATA%\42467\Desktop.ini
  • %APPDATA%\Apple Computer\Preferences\com.apple.Safari.plist
  • %APPDATA%\Maxthon3\Users\guest\Favorite\Favorite.dat
  • %APPDATA%\Maxthon3\Users\guest\Config\config.ini
  • %APPDATA%\Maxthon3\Users\guest\Config\config.dat
  • <LS_APPDATA>\Google\Chrome\User Data\Default\Preferences
  • <LS_APPDATA>\Google\Chrome\User Data\Default\Bookmarks
  • %APPDATA%\Maxthon3\Users\guest\Favorite\tempfb.dat
Deletes the following files:
  • %TEMP%\nsj2.tmp\nsRandom.dll

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android