%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\regedit[1].jpg
%ALLUSERSPROFILE%\Application Data\Win-Fixed.exe
%TEMP%\XLW.resources
%WINDIR%\Win-boot.EXE
<SYSTEM32>\Booter.EXE
C:\Autorun.inf
%TEMP%\tWYgsex.resources
%TEMP%\hbmfhtfc.out
%TEMP%\vbc4.tmp
%TEMP%\RES5.tmp
%TEMP%\whatdafock.txt
%TEMP%\hbmfhtfc.0.vb
%TEMP%\hbmfhtfc.cmdline
%TEMP%\aut1.tmp
%TEMP%\gcwjsbv
%TEMP%\86t7y.resources
%TEMP%\JnHvnEr.resources
%TEMP%\System Volume Information.exe
%TEMP%\svchost.exe
%TEMP%\MSNPSharp.dll
%TEMP%\vbc2.tmp
%TEMP%\RES3.tmp
%TEMP%\qe4-s4gb.exe
%TEMP%\qe4-s4gb.0.vb
%TEMP%\qe4-s4gb.cmdline
%TEMP%\qe4-s4gb.out
Sets the 'hidden' attribute to the following files:
C:\Autorun.inf
%ALLUSERSPROFILE%\Application Data\Win-Fixed.exe
<Drive name for removable media>:\Autorun.inf
C:\Ntldr.EXE
%WINDIR%\Win-boot.EXE
<SYSTEM32>\Booter.EXE
Deletes the following files:
%TEMP%\qe4-s4gb.exe
%TEMP%\qe4-s4gb.0.vb
<Drive name for removable media>:\Autorun.inf
%TEMP%\vbc4.tmp
%TEMP%\RES5.tmp
%TEMP%\qe4-s4gb.cmdline
%TEMP%\gcwjsbv
%TEMP%\aut1.tmp
%TEMP%\RES3.tmp
%TEMP%\qe4-s4gb.out
%TEMP%\vbc2.tmp
Network activity:
Connects to:
'h1.##pway.com':80
'17#.#3.169.14':80
TCP:
HTTP GET requests:
h1.##pway.com/up/apps/regedit.jpg
UDP:
DNS ASK h1.##pway.com
Miscellaneous:
Searches for the following windows:
ClassName: 'Indicator' WindowName: '(null)'
Download Dr.Web for Android
Free three-month trial
All protection features available
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more