<Drive name for removable media>:\RECYCLER\S-4-6-78-7550137860-4636734705-565032534-3656\dAmVUQWk.cpl
<Drive name for removable media>:\autorun.inf
<Drive name for removable media>:\RECYCLER\S-4-6-78-7550137860-4636734705-565032534-3656\FuuAorrO.exe
Malicious functions:
Creates and executes the following:
%PROGRAM_FILES%\Microsoft\WaterMark.exe
<Auxiliary element>
Executes the following:
<SYSTEM32>\svchost.exe
Injects code into
the following system processes:
<SYSTEM32>\spoolsv.exe
<SYSTEM32>\svchost.exe
%WINDIR%\Explorer.EXE
<SYSTEM32>\alg.exe
<SYSTEM32>\ctfmon.exe
<SYSTEM32>\lsass.exe
<SYSTEM32>\smss.exe
System
<SYSTEM32>\csrss.exe
<SYSTEM32>\services.exe
<SYSTEM32>\winlogon.exe
a large number of user processes.
Modifies file system :
Creates the following files:
<SYSTEM32>\dmlconf.dat
%PROGRAM_FILES%\Microsoft\WaterMark.exe
<Auxiliary element>
Network activity:
Connects to:
'ea###ybstr.com':443
'74.##5.232.51':80
'fg###career.com':443
UDP:
DNS ASK ea###ybstr.com
DNS ASK google.com
DNS ASK fg###career.com
Download Dr.Web for Android
Free three-month trial
All protection features available
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more