<Drive name for removable media>:\RECYCLER\S-3-6-01-5754620102-1334737640-061201044-8252\uJIxeMUp.cpl
<Drive name for removable media>:\autorun.inf
<Drive name for removable media>:\RECYCLER\S-3-6-01-5754620102-1334737640-061201044-8252\NhTcjZrg.exe
Malicious functions:
Creates and executes the following:
%PROGRAM_FILES%\Microsoft\WaterMark.exe
Executes the following:
<SYSTEM32>\svchost.exe
Injects code into
the following system processes:
<SYSTEM32>\cscript.exe
a large number of user processes.
Modifies file system :
Creates the following files:
<SYSTEM32>\dmlconf.dat
%PROGRAM_FILES%\Microsoft\WaterMark.exe
Network activity:
Connects to:
'er#####dthetcwerc.com':443
'rv####eitwjeitv.com':443
'rt######tutnrsbberve.com':443
'91.##0.62.30':443
'74.##5.232.51':80
UDP:
DNS ASK er#####dthetcwerc.com
DNS ASK rv####eitwjeitv.com
DNS ASK google.com
DNS ASK rt######tutnrsbberve.com
Download Dr.Web for Android
Free three-month trial
All protection features available
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more