<Drive name for removable media>:\Recycler\S-1-5-21-5705561107-358453775-6007341644-500\desktop.ini
<Drive name for removable media>:\Recycler\S-1-5-21-5705561107-358453775-6007341644-500\~WRL4904.tmp
Malicious functions:
Creates and executes the following:
%ALLUSERSPROFILE%\Application Data\services.exe
%ALLUSERSPROFILE%\Application Data\ccSetMgr.exe
Injects code into
the following system processes:
%WINDIR%\Explorer.EXE
Modifies file system :
Creates the following files:
%TEMP%\explorer.exe
<SYSTEM32>\hkcmds.exe
<SYSTEM32>\setpaths.exe
%ALLUSERSPROFILE%\Application Data\ccSetMgr.exe
%ALLUSERSPROFILE%\Application Data\services.exe
%TEMP%\LSASS.EXE
Sets the 'hidden' attribute to the following files:
<Drive name for removable media>:\Recycler\S-1-5-21-5705561107-358453775-6007341644-500\desktop.ini
<Drive name for removable media>:\AutoRun.inf
%ALLUSERSPROFILE%\Application Data\services.exe
<Drive name for removable media>:\Recycler\S-1-5-21-5705561107-358453775-6007341644-500\~WRL4904.tmp
Deletes the following files:
%TEMP%\LSASS.EXE
%TEMP%\explorer.exe
Deletes itself.
Network activity:
Connects to:
'ch#####l.chatnook.com':8080
'ch####ail.toh.info':8080
'ch#####l.chatnook.com':443
'ch####ail.toh.info':443
UDP:
DNS ASK ch####ail.toh.info
DNS ASK ch#####l.chatnook.com
'<Private IP address>':1035
'<Private IP address>':1034
Miscellaneous:
Searches for the following windows:
ClassName: 'Shell_TrayWnd' WindowName: ''
ClassName: 'Indicator' WindowName: ''
Download Dr.Web for Android
Free three-month trial
All protection features available
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more