OpenLink Software

Usage stats on Worm.Win32.Adjunto.A@mm

 Permalink

an Entity in Data Space: 134.155.108.49:8890

Once executed, the worm copies itself as:%Windir%\svchost.exe The worm creates the following registry entry so that it is executed every time Windows starts:HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\"svchost" = "%Windir%\svchost.exe" The worm then creates the following registry subkey and value:HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\System7154\"GL" = "[DATE]" The worm opens a back door on the compromised computer on TCP port 7154. The worm displays a dialog box with one of the following texts: "No me olvido de ti" screen.zip * %Windir% * %ProgramFiles%

Graph IRICount
http://dbkwik.webdatacommons.org7
Alternative Linked Data Views: ODE     Raw Data in: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] This material is Open Knowledge Creative Commons License Valid XHTML + RDFa
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 Unported License.
OpenLink Virtuoso version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Copyright © 2009-2012 OpenLink Software