Sets the 'hidden' attribute to the following files:
<Drive name for removable media>:\puohe.exe
<Drive name for removable media>:\autorun.inf
%HOMEPATH%\puohe.exe
Deletes the following files:
%TEMP%\h1_19hcm.cmdline
%TEMP%\vbc12.tmp
%TEMP%\RES13.tmp
%TEMP%\h1_19hcm.0.vb
%TEMP%\ZE.resources
%TEMP%\Z.resources
%TEMP%\h1_19hcm.out
%TEMP%\r6b8l4o8.0.vb
%TEMP%\r6b8l4o8.out
%TEMP%\r6b8l4o8.cmdline
%TEMP%\A.resources
<Drive name for removable media>:\puohe.exe
<Drive name for removable media>:\puohe_backup.exe
%TEMP%\qybFsP.resources
%TEMP%\5i4jnlia.cmdline
%TEMP%\vbc18.tmp
%TEMP%\RES19.tmp
%TEMP%\5i4jnlia.out
%TEMP%\FkXz.resources
%TEMP%\IgaLd.resources
%TEMP%\5i4jnlia.0.vb
%TEMP%\03yc4wqd.out
%TEMP%\vbc15.tmp
%TEMP%\RES16.tmp
%TEMP%\03yc4wqd.cmdline
%TEMP%\Bo.resources
%TEMP%\ioKEP.resources
%TEMP%\03yc4wqd.0.vb
%TEMP%\RESA.tmp
<Drive name for removable media>:\Passwords.exe
<Drive name for removable media>:\Porn.exe
%TEMP%\vbc9.tmp
%TEMP%\ntxidjst.0.vb
%TEMP%\ntxidjst.cmdline
%TEMP%\ntxidjst.out
%TEMP%\ojipiu9z.0.vb
%TEMP%\vbc1.tmp
%TEMP%\RES2.tmp
%TEMP%\ojipiu9z.cmdline
<Drive name for removable media>:\Sexy.exe
%TEMP%\ojipiu9z.exe
%TEMP%\ojipiu9z.out
%TEMP%\xIsdWENZ.resources
%TEMP%\via4ctzk.cmdline
%TEMP%\via4ctzk.0.vb
%TEMP%\JmhGs.resources
%TEMP%\vbcF.tmp
%TEMP%\RES10.tmp
<Drive name for removable media>:\Porn_backup.exe
<Drive name for removable media>:\Passwords_backup.exe
%TEMP%\RoFFb.resources
%TEMP%\eNu.resources
%TEMP%\windowsupdate.ico
%TEMP%\via4ctzk.out
%TEMP%\vbcC.tmp
%TEMP%\RESD.tmp
Network activity:
Connects to:
'ns#.###pstickers.com':8000
'17#.#3.169.14':80
UDP:
DNS ASK ns#.###pstickers.com
Miscellaneous:
Searches for the following windows:
ClassName: 'Indicator' WindowName: '(null)'
Download Dr.Web for Android
Free three-month trial
All protection features available
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more