[<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '<Full path to virus>' = '<Full path to virus>:*:Enabled:ipsec'
To complicate detection of its presence in the operating system,
forces the system hide from view:
hidden files
blocks execution of the following system utilities:
Windows Task Manager (Taskmgr)
Registry Editor (RegEdit)
blocks the following features:
User Account Control (UAC)
Windows Security Center
Creates and executes the following:
%TEMP%\a.exe
%TEMP%\a.exe (downloaded from the Internet)
Executes the following:
<SYSTEM32>\notepad.exe
<SYSTEM32>\netsh.exe firewall set opmode disable
Injects code into
the following system processes:
<SYSTEM32>\notepad.exe
a large number of user processes.
Modifies file system :
Creates the following files:
%TEMP%\winfuouq.exe
%TEMP%\winibkyw.exe
%TEMP%\phcx.exe
%TEMP%\tfppx.exe
%TEMP%\rput.exe
%TEMP%\cttecw.exe
%TEMP%\0003708D_Rar\<Virus name>.exe
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\u[1].exe
%TEMP%\winjiwx.exe
%TEMP%\a.exe
Sets the 'hidden' attribute to the following files:
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more