C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\8PI70DM3\desktop.ini
C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\YN7RD19E\desktop.ini
C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\UP6P0HKP\desktop.ini
C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\RJBUV52Y\desktop.ini
%TEMP%\1.tmp
%WINDIR%\Temp\2.tmp
Sets the 'hidden' attribute to the following files:
C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\YN7RD19E\desktop.ini
C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\UP6P0HKP\desktop.ini
C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\RJBUV52Y\desktop.ini
C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\8PI70DM3\desktop.ini
Deletes the following files:
%WINDIR%\Temp\2.tmp
%TEMP%\1.tmp
Moves the following system files:
from <SYSTEM32>\spoolsv.exe to %WINDIR%\Temp\4.tmp
Moves the following files:
from <SYSTEM32>\dllcache\spoolsv.exe.new to <SYSTEM32>\dllcache\spoolsv.exe
Moves itself:
from <Full path to virus> to %TEMP%\3.tmp
Network activity:
Connects to:
'ru####kumoet.com':8080
'4s##rs.com':80
TCP:
HTTP GET requests:
4s##rs.com/task/
UDP:
DNS ASK ru####kumoet.com
DNS ASK 4s##rs.com
Descargue Dr.Web para Android
Gratis por 3 meses
Todos los componentes de protección
Renovación de la demo a través de AppGallery/Google Pay
Si Vd. continúa usando este sitio web, esto significa que Vd. acepta el uso de archivos Cookie y otras tecnologías para que recabemos las estadísticas sobre los visitantes. Más información