<Drive name for removable media>:\Gay\Straight\sysdiag64.exe
<Drive name for removable media>:\Gay\Straight\Desktop.ini
Malicious functions:
Creates and executes the following:
%WINDIR%\sysdiag64.exe
Modifies file system :
Creates the following files:
%WINDIR%\sysdiag64.exe
Sets the 'hidden' attribute to the following files:
<Drive name for removable media>:\Gay\Straight\sysdiag64.exe
%WINDIR%\sysdiag64.exe
Network activity:
Connects to:
'xy#.#c3n.info':6667
'ni###tatz.net':80
TCP:
HTTP GET requests:
ni###tatz.net/Statz/index.php?ne#
UDP:
DNS ASK xy#.#c3n.info
DNS ASK ni###tatz.net
Miscellaneous:
Searches for the following windows:
ClassName: 'SysListView32' WindowName: ''
ClassName: 'Indicator' WindowName: ''
ClassName: '#32770' WindowName: ''
ClassName: 'RegEdit_RegEdit' WindowName: ''
Download Dr.Web for Android
Free three-month trial
All protection features available
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more