<Drive name for removable media>:\basurausb\desktop.ini
<Drive name for removable media>:\autorun.inf
<Drive name for removable media>:\t-d-_ev_1_setup.eAe
Malicious functions:
Creates and executes the following:
'C:\C-v.sys\esclafamc.eAe'
'C:\C-v.sys\csrss.eAe'
Modifies file system :
Creates the following files:
C:\C-v.sys\esclafamc.eAe
C:\C-v.sys\mamut.tmp.txt
C:\C-v.sys\Desktop.ini
C:\C-v.sys\csrss.eAe
Sets the 'hidden' attribute to the following files:
C:\C-v.sys\esclafamc.eAe
<Drive name for removable media>:\autorun.inf
C:\C-v.sys\csrss.eAe
C:\C-v.sys\Desktop.ini
Deletes the following files:
%TEMP%\~DFD99A.tmp
Miscellaneous:
Searches for the following windows:
ClassName: '' WindowName: 'Restaurar sistema'
ClassName: '' WindowName: 'Pirif-rm CCleaver'
ClassName: '' WindowName: 'w32famcap'
ClassName: '' WindowName: 'escla--cap'
ClassName: '' WindowName: 'Admivistrad-r de tareas de Wivd-ws'
ClassName: 'Shell_TrayWnd' WindowName: ''
ClassName: '' WindowName: 'Utilidad de c-vfiguraciv del sistema'
ClassName: '' WindowName: 'Edit-r del Registr-'
Download Dr.Web for Android
Free three-month trial
All protection features available
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more