'%TEMP%\hsadjku.exe' (downloaded from the Internet)
'%TEMP%\dw3re.exe' (downloaded from the Internet)
'%TEMP%\yhtdayrg.exe' (downloaded from the Internet)
'%TEMP%\ksaduytr.exe' (downloaded from the Internet)
'%TEMP%\kusadtylds.exe' (downloaded from the Internet)
Modifies file system :
Creates the following files:
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\bnew[1].exe
%TEMP%\ksaduytr.exe
%TEMP%\hsadjku.exe
%TEMP%\dw3re.exe
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\dqnew[1].exe
%TEMP%\kusadtylds.exe
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\zpm[1].exe
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\bet[1].exe
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\ng[1].exe
%TEMP%\yhtdayrg.exe
Deletes the following files:
%TEMP%\ksaduytr.exe
%TEMP%\hsadjku.exe
%TEMP%\kusadtylds.exe
%TEMP%\yhtdayrg.exe
Network activity:
Connects to:
'54.##1.185.232':80
'localhost':1035
TCP:
HTTP GET requests:
54.##1.185.232/bnew.exe
54.##1.185.232/dqnew.exe
54.##1.185.232/ng.exe
54.##1.185.232/zpm.exe
54.##1.185.232/bet.exe
Download Dr.Web for Android
Free three-month trial
All protection features available
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more