<Drive name for removable media>:\installsetup.exe
Malicious functions:
Creates and executes the following:
'%APPDATA%\services.exe'
Modifies file system :
Creates the following files:
%APPDATA%\pag.html
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\uprubeba[1].html
%APPDATA%\services.exe
Sets the 'hidden' attribute to the following files:
<Drive name for removable media>:\installsetup.exe
<Drive name for removable media>:\acceso.lnk
%APPDATA%\services.exe
Network activity:
Connects to:
'th######tnews.blogspot.mx':80
'localhost':1035
TCP:
HTTP GET requests:
th######tnews.blogspot.mx/2012/01/uprubeba.html
UDP:
DNS ASK th######tnews.blogspot.mx
Miscellaneous:
Searches for the following windows:
ClassName: 'MS_WINHELP' WindowName: ''
ClassName: 'Shell_TrayWnd' WindowName: ''
Download Dr.Web for Android
Free three-month trial
All protection features available
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more