<Drive name for removable media>:\{user-egregregerfwde}\svhost.exe
<Drive name for removable media>:\contosoroot_1.cer.lnk
<Drive name for removable media>:\{user-egregregerfwde}\contosoroot_1.cer
<Drive name for removable media>:\dashborder_192.bmp.lnk
<Drive name for removable media>:\{user-egregregerfwde}\dashborder_192.bmp
<Drive name for removable media>:\dashborder_144.bmp.lnk
<Drive name for removable media>:\{user-egregregerfwde}\dashborder_144.bmp
<Drive name for removable media>:\dialmap.bmp.lnk
<Drive name for removable media>:\{user-egregregerfwde}\dialmap.bmp
<Drive name for removable media>:\tileimage.bmp.lnk
<Drive name for removable media>:\{user-egregregerfwde}\tileimage.bmp
<Drive name for removable media>:\{user-egregregerfwde}\testee.cer
<Drive name for removable media>:\default.bmp.lnk
<Drive name for removable media>:\dashborder_96.bmp.lnk
<Drive name for removable media>:\{user-egregregerfwde}\dashborder_96.bmp
<Drive name for removable media>:\join.avi.lnk
<Drive name for removable media>:\{user-egregregerfwde}\join.avi
<Drive name for removable media>:\000814251_video_01.avi.lnk
<Drive name for removable media>:\{user-egregregerfwde}\000814251_video_01.avi
<Drive name for removable media>:\split.avi.lnk
<Drive name for removable media>:\svhost.exe
<Drive name for removable media>:\{user-egregregerfwde}\split.avi
<Drive name for removable media>:\autorun.inf
<Drive name for removable media>:\{user-egregregerfwde}\default.bmp
<Drive name for removable media>:\testee.cer.lnk
Malicious functions
Injects code into
the following system processes:
%WINDIR%\explorer.exe
the following user processes:
winhost.exe
Modifies file system
Creates the following files
%TEMP%\winhost.exe
Sets the 'hidden' attribute to the following files
%APPDATA%\svhost.exe
<Drive name for removable media>:\{user-egregregerfwde}\svhost.exe
<Drive name for removable media>:\autorun.inf
<Drive name for removable media>:\svhost.exe
Moves the following files
from %TEMP%\winhost.exe to %APPDATA%\svhost.exe
Network activity
UDP
DNS ASK de#####ize.sdeirc.net
Miscellaneous
Creates and executes the following
'%TEMP%\winhost.exe'
Descargue Dr.Web para Android
Gratis por 3 meses
Todos los componentes de protección
Renovación de la demo a través de AppGallery/Google Pay
Si Vd. continúa usando este sitio web, esto significa que Vd. acepta el uso de archivos Cookie y otras tecnologías para que recabemos las estadísticas sobre los visitantes. Más información