マイライブラリ
マイライブラリ

+ マイライブラリに追加

電話

お問い合わせ履歴

電話(英語)

+7 (495) 789-45-86

Profile

Trojan.MulDrop8.32970

Added to the Dr.Web virus database: 2018-07-31

Virus description added:

Technical Information

To ensure autorun and distribution:
Creates the following files on removable media:
  • <Drive name for removable media>:\МФ±¦НшВтјТ№єОпЦъКЦ(ВМЙ«Гв°ІЧ°°ж).exe
Modifies file system:
Creates the following files:
  • %ProgramFiles%\UUCSSS\ModBNAMEVVK.exe
  • %APPDATA%\98024\УйАЦ\ЖрµгЦРОДНш.url
  • %APPDATA%\98024\УйАЦ\ЛС№·ТфАЦ.url
  • %APPDATA%\98024\УйАЦ\ЛСєьёЯЗеУ°КУѕз.url
  • %APPDATA%\98024\УйАЦ\ЛСєьУйАЦ.url
  • %APPDATA%\98024\УйАЦ\УЕїбКУЖµ.url
  • %APPDATA%\98024\БґЅУ\4399РЎУОП·.url
  • %APPDATA%\98024\БґЅУ\GoogleЛСЛч.url
  • %APPDATA%\98024\БґЅУ\°Щ¶ИЛСЛч.url
  • %APPDATA%\98024\БґЅУ\іЈУГІйСЇ.url
  • %APPDATA%\98024\УйАЦ\17173НшУОГЕ»§.url
  • %APPDATA%\98024\УйАЦ\В№¶¦јЗ.url
  • %APPDATA%\98024\БґЅУ\ИИГЕУОП·.url
  • %APPDATA%\98024\БґЅУ\НшЙП№єОп.url
  • %APPDATA%\98024\БґЅУ\НшЦ·ґуИ«.url
  • %APPDATA%\98024\БґЅУ\ІЖѕ­\¶«·ЅІЖё»Нш.url
  • %APPDATA%\98024\БґЅУ\ІЖѕ­\єНС¶Нш.url
  • %APPDATA%\98024\БґЅУ\ІЖѕ­\ЅрИЪЅз.url
  • %APPDATA%\98024\БґЅУ\ІЖѕ­\ЛСєьІЖѕ­.url
  • %APPDATA%\98024\БґЅУ\ІЖѕ­\РВАЛІЖѕ­.url
  • %APPDATA%\98024\БґЅУ\ІЖѕ­\Ц¤ИЇЦ®РЗ.url
  • %APPDATA%\98024\БґЅУ\ІЖѕ­\ЦР№ъЦ¤ИЇНш.url
  • %APPDATA%\98024\БґЅУ\МФ±¦Нш.url
  • %APPDATA%\98024\БґЅУ\НБ¶№НшµзУ°.url
  • %APPDATA%\98024\Йъ»о\ЧїФЅНш.url
  • %APPDATA%\98024\Йъ»о\ЦР»ЄУўІЕНш.url
  • %APPDATA%\98024\Йъ»о\ЦЗБЄХРЖёНш.url
  • %APPDATA%\98024\ГЕ»§\QQ.com.url
  • %APPDATA%\98024\ГЕ»§\ЛСєьНш.url
  • %APPDATA%\98024\ГЕ»§\ЛСєьРВОЕ.url
  • %APPDATA%\98024\ГЕ»§\МЪС¶РВОЕ.url
  • %APPDATA%\98024\ГЕ»§\МмБъ°ЛІї.url
  • %APPDATA%\98024\ГЕ»§\НшТЧ.url
  • %APPDATA%\98024\ГЕ»§\РВАЛНш.url
  • %APPDATA%\98024\ГЕ»§\РВАЛРВОЕ.url
  • %APPDATA%\98024\ЙзЗш\chinarenЙзЗш.url
  • %APPDATA%\98024\ЙзЗш\°Щ¶ИМщ°Й.url
  • %APPDATA%\98024\№¤ѕЯ\МмїХИнјюХѕ.url
  • %APPDATA%\98024\ЙзЗш\їЄРДНш.url
  • %APPDATA%\98024\ЙзЗш\ЛСєьІ©їН.url
  • %APPDATA%\98024\ЙзЗш\ЛСєьЙзЗш.url
  • %APPDATA%\98024\ЙзЗш\МмСДЙзЗш.url
  • %APPDATA%\98024\ЙзЗш\РЈДЪНш.url
  • %APPDATA%\98024\Йъ»о\Ѕ№µг·їµШІъНш.url
  • %APPDATA%\98024\Йъ»о\ѕ©¶«ЙМіЗ.url
  • %APPDATA%\98024\Йъ»о\КЦ»ъЦ®јТ.url
  • %APPDATA%\98024\Йъ»о\ЛС·їНш.url
  • %APPDATA%\98024\Йъ»о\ЛСєьЖыіµ.url
  • %APPDATA%\98024\Йъ»о\МФ±¦Нш.url
  • %APPDATA%\98024\ЙзЗш\ЛС№·Лµ°Й.url
  • %APPDATA%\98024\БґЅУ\ІЖѕ­\ЦРЅрФЪПЯ.url
  • %APPDATA%\98024\БґЅУ\№¤ѕЯ\°Щ¶ИЛСЛч.url
  • %APPDATA%\98024\БґЅУ\№¤ѕЯ\№Иёи·­Тл.url
  • %APPDATA%\98024\БґЅУ\№¤ѕЯ\№ИёиЛСЛч.url
  • %APPDATA%\98024\БґЅУ\Йъ»о\ЦЗБЄХРЖёНш.url
  • %APPDATA%\98024\БґЅУ\Йъ»о\ЦР»ЄУўІЕНш.url
  • %APPDATA%\98024\БґЅУ\Йъ»о\ЧїФЅНш.url
  • %APPDATA%\98024\БґЅУ\УйАЦ\17173НшУОГЕ»§.url
  • %APPDATA%\98024\БґЅУ\УйАЦ\В№¶¦јЗ.url
  • %APPDATA%\98024\БґЅУ\УйАЦ\ЖрµгЦРОДНш.url
  • %APPDATA%\98024\БґЅУ\УйАЦ\ЛС№·ТфАЦ.url
  • %APPDATA%\98024\БґЅУ\УйАЦ\ЛСєьёЯЗеУ°КУѕз.url
  • %APPDATA%\98024\БґЅУ\УйАЦ\ЛСєьУйАЦ.url
  • %APPDATA%\98024\БґЅУ\УйАЦ\УЕїбКУЖµ.url
  • %ProgramFiles%\USER_FILES\1.ico
  • %ProgramFiles%\USER_FILES\2.ico
  • %ProgramFiles%\USER_FILES\3.ico
  • %ProgramFiles%\USER_FILES\4.ico
  • %ProgramFiles%\USER_FILES\5.ico
  • %ProgramFiles%\USER_FILES\6.ico
  • %ProgramFiles%\USER_FILES\ИИГЕУОП·.url
  • %ProgramFiles%\USER_FILES\МФ±¦Нш.url
  • %ProgramFiles%\USER_FILES\НБ¶№НшµзУ°.url
  • %ProgramFiles%\USER_FILES\НшЦ·µјєЅ.url
  • %ProgramFiles%\USER_FILES\ПВФШёЯЗеУ°КУІҐ·ЕЖч.url
  • %HOMEPATH%\98024\МФ±¦№єОп.lnk
  • %HOMEPATH%\98024\НБ¶№НшµзУ°.lnk
  • %APPDATA%\98024\БґЅУ\Йъ»о\МФ±¦Нш.url
  • %APPDATA%\98024\БґЅУ\Йъ»о\ЛС·їНш.url
  • %APPDATA%\98024\БґЅУ\Йъ»о\ЛСєьЖыіµ.url
  • %APPDATA%\98024\БґЅУ\Йъ»о\КЦ»ъЦ®јТ.url
  • %APPDATA%\98024\БґЅУ\№¤ѕЯ\»ЄѕьИнјюФ°.url
  • %APPDATA%\98024\БґЅУ\№¤ѕЯ\ЛС№·µШНј.url
  • %APPDATA%\98024\БґЅУ\№¤ѕЯ\ЛС№·ЛСЛч.url
  • %APPDATA%\98024\БґЅУ\№¤ѕЯ\ЛСєьУКПд.url
  • %APPDATA%\98024\БґЅУ\№¤ѕЯ\МмїХИнјюХѕ.url
  • %APPDATA%\98024\БґЅУ\ГЕ»§\QQ.com.url
  • %APPDATA%\98024\БґЅУ\ГЕ»§\ЛСєьНш.url
  • %APPDATA%\98024\БґЅУ\ГЕ»§\ЛСєьРВОЕ.url
  • %APPDATA%\98024\БґЅУ\ГЕ»§\МЪС¶РВОЕ.url
  • %APPDATA%\98024\БґЅУ\ГЕ»§\МмБъ°ЛІї.url
  • %APPDATA%\98024\БґЅУ\ГЕ»§\НшТЧ.url
  • %APPDATA%\98024\БґЅУ\ГЕ»§\РВАЛНш.url
  • %APPDATA%\98024\БґЅУ\ГЕ»§\РВАЛРВОЕ.url
  • %APPDATA%\98024\БґЅУ\ЙзЗш\chinarenЙзЗш.url
  • %APPDATA%\98024\БґЅУ\ЙзЗш\°Щ¶ИМщ°Й.url
  • %APPDATA%\98024\БґЅУ\ЙзЗш\їЄРДНш.url
  • %APPDATA%\98024\БґЅУ\ЙзЗш\ЛС№·Лµ°Й.url
  • %APPDATA%\98024\БґЅУ\ЙзЗш\ЛСєьІ©їН.url
  • %APPDATA%\98024\БґЅУ\ЙзЗш\ЛСєьЙзЗш.url
  • %APPDATA%\98024\БґЅУ\ЙзЗш\МмСДЙзЗш.url
  • %APPDATA%\98024\БґЅУ\ЙзЗш\РЈДЪНш.url
  • %APPDATA%\98024\БґЅУ\Йъ»о\Ѕ№µг·їµШІъНш.url
  • %APPDATA%\98024\БґЅУ\Йъ»о\ѕ©¶«ЙМіЗ.url
  • %HOMEPATH%\98024\НшЦ·µјєЅ.lnk
  • %APPDATA%\98024\№¤ѕЯ\ЛСєьУКПд.url
  • %APPDATA%\98024\№¤ѕЯ\ЛС№·ЛСЛч.url
  • %APPDATA%\98024\№¤ѕЯ\ЛС№·µШНј.url
  • C:\USER_FILES\іЈУГНшЦ·\ГЕ»§\МЪС¶РВОЕ.url
  • C:\USER_FILES\іЈУГНшЦ·\ГЕ»§\МмБъ°ЛІї.url
  • C:\USER_FILES\іЈУГНшЦ·\ГЕ»§\НшТЧ.url
  • C:\USER_FILES\іЈУГНшЦ·\ГЕ»§\РВАЛНш.url
  • C:\USER_FILES\іЈУГНшЦ·\ГЕ»§\РВАЛРВОЕ.url
  • C:\USER_FILES\іЈУГНшЦ·\ЙзЗш\chinarenЙзЗш.url
  • C:\USER_FILES\іЈУГНшЦ·\ЙзЗш\°Щ¶ИМщ°Й.url
  • C:\USER_FILES\іЈУГНшЦ·\ЙзЗш\їЄРДНш.url
  • C:\USER_FILES\іЈУГНшЦ·\ЙзЗш\ЛС№·Лµ°Й.url
  • C:\USER_FILES\іЈУГНшЦ·\ГЕ»§\ЛСєьНш.url
  • C:\USER_FILES\іЈУГНшЦ·\ГЕ»§\ЛСєьРВОЕ.url
  • C:\USER_FILES\іЈУГНшЦ·\ЙзЗш\ЛСєьІ©їН.url
  • C:\USER_FILES\іЈУГНшЦ·\ЙзЗш\РЈДЪНш.url
  • C:\USER_FILES\іЈУГНшЦ·\Йъ»о\Ѕ№µг·їµШІъНш.url
  • C:\USER_FILES\іЈУГНшЦ·\Йъ»о\ѕ©¶«ЙМіЗ.url
  • C:\USER_FILES\іЈУГНшЦ·\Йъ»о\КЦ»ъЦ®јТ.url
  • C:\USER_FILES\іЈУГНшЦ·\Йъ»о\ЛС·їНш.url
  • C:\USER_FILES\іЈУГНшЦ·\Йъ»о\ЛСєьЖыіµ.url
  • C:\USER_FILES\іЈУГНшЦ·\Йъ»о\МФ±¦Нш.url
  • C:\USER_FILES\іЈУГНшЦ·\Йъ»о\ЦЗБЄХРЖёНш.url
  • C:\USER_FILES\іЈУГНшЦ·\Йъ»о\ЦР»ЄУўІЕНш.url
  • C:\USER_FILES\іЈУГНшЦ·\ЙзЗш\ЛСєьЙзЗш.url
  • C:\USER_FILES\іЈУГНшЦ·\ЙзЗш\МмСДЙзЗш.url
  • C:\USER_FILES\іЈУГНшЦ·\ГЕ»§\QQ.com.url
  • C:\USER_FILES\іЈУГНшЦ·\№¤ѕЯ\МмїХИнјюХѕ.url
  • C:\USER_FILES\іЈУГНшЦ·\№¤ѕЯ\ЛСєьУКПд.url
  • C:\USER_FILES\GoogleЛСЛч.url
  • C:\USER_FILES\°Щ¶ИЛСЛч.url
  • C:\USER_FILES\іЈУГІйСЇ.url
  • C:\USER_FILES\ИИГЕУОП·.url
  • C:\USER_FILES\МФ±¦Нш.url
  • C:\USER_FILES\НБ¶№НшµзУ°.url
  • C:\USER_FILES\НшЙП№єОп.url
  • C:\USER_FILES\НшЦ·ґуИ«.url
  • C:\USER_FILES\іЈУГНшЦ·\ІЖѕ­\¶«·ЅІЖё»Нш.url
  • C:\USER_FILES\іЈУГНшЦ·\ІЖѕ­\єНС¶Нш.url
  • C:\USER_FILES\4399РЎУОП·.url
  • C:\USER_FILES\іЈУГНшЦ·\ІЖѕ­\ЅрИЪЅз.url
  • C:\USER_FILES\іЈУГНшЦ·\ІЖѕ­\РВАЛІЖѕ­.url
  • C:\USER_FILES\іЈУГНшЦ·\ІЖѕ­\Ц¤ИЇЦ®РЗ.url
  • C:\USER_FILES\іЈУГНшЦ·\ІЖѕ­\ЦР№ъЦ¤ИЇНш.url
  • C:\USER_FILES\іЈУГНшЦ·\ІЖѕ­\ЦРЅрФЪПЯ.url
  • C:\USER_FILES\іЈУГНшЦ·\№¤ѕЯ\°Щ¶ИЛСЛч.url
  • C:\USER_FILES\іЈУГНшЦ·\№¤ѕЯ\№Иёи·­Тл.url
  • C:\USER_FILES\іЈУГНшЦ·\№¤ѕЯ\№ИёиЛСЛч.url
  • C:\USER_FILES\іЈУГНшЦ·\№¤ѕЯ\»ЄѕьИнјюФ°.url
  • C:\USER_FILES\іЈУГНшЦ·\№¤ѕЯ\ЛС№·µШНј.url
  • C:\USER_FILES\іЈУГНшЦ·\№¤ѕЯ\ЛС№·ЛСЛч.url
  • C:\USER_FILES\іЈУГНшЦ·\ІЖѕ­\ЛСєьІЖѕ­.url
  • C:\USER_FILES\іЈУГНшЦ·\Йъ»о\ЧїФЅНш.url
  • C:\USER_FILES\іЈУГНшЦ·\УйАЦ\17173НшУОГЕ»§.url
  • C:\USER_FILES\іЈУГНшЦ·\УйАЦ\В№¶¦јЗ.url
  • C:\USER_FILES\іЈУГНшЦ·\УйАЦ\ЖрµгЦРОДНш.url
  • %APPDATA%\98024\Links\Windows Marketplace.url
  • %APPDATA%\98024\Links\Windows Media.url
  • %APPDATA%\98024\Links\Windows.url
  • %APPDATA%\98024\4399РЎУОП·.url
  • %APPDATA%\98024\GoogleЛСЛч.url
  • %APPDATA%\98024\°Щ¶ИЛСЛч.url
  • %APPDATA%\98024\іЈУГІйСЇ.url
  • %APPDATA%\98024\ИИГЕУОП·.url
  • %APPDATA%\98024\МФ±¦Нш.url
  • %APPDATA%\98024\НБ¶№НшµзУ°.url
  • %APPDATA%\98024\НшЙП№єОп.url
  • %APPDATA%\98024\НшЦ·ґуИ«.url
  • %APPDATA%\98024\ІЖѕ­\¶«·ЅІЖё»Нш.url
  • %APPDATA%\98024\ІЖѕ­\єНС¶Нш.url
  • %APPDATA%\98024\ІЖѕ­\ЅрИЪЅз.url
  • %APPDATA%\98024\ІЖѕ­\ЛСєьІЖѕ­.url
  • %APPDATA%\98024\ІЖѕ­\РВАЛІЖѕ­.url
  • %APPDATA%\98024\ІЖѕ­\Ц¤ИЇЦ®РЗ.url
  • %APPDATA%\98024\ІЖѕ­\ЦР№ъЦ¤ИЇНш.url
  • %APPDATA%\98024\ІЖѕ­\ЦРЅрФЪПЯ.url
  • %APPDATA%\98024\№¤ѕЯ\°Щ¶ИЛСЛч.url
  • %APPDATA%\98024\№¤ѕЯ\№Иёи·­Тл.url
  • %APPDATA%\98024\№¤ѕЯ\№ИёиЛСЛч.url
  • %APPDATA%\98024\Links\Free Hotmail.url
  • %APPDATA%\98024\Radio Station Guide.url
  • %APPDATA%\98024\Links\Customize Links.url
  • %APPDATA%\98024\MSN.com.url
  • C:\USER_FILES\іЈУГНшЦ·\УйАЦ\ЛС№·ТфАЦ.url
  • C:\USER_FILES\іЈУГНшЦ·\УйАЦ\ЛСєьёЯЗеУ°КУѕз.url
  • C:\USER_FILES\іЈУГНшЦ·\УйАЦ\ЛСєьУйАЦ.url
  • C:\USER_FILES\іЈУГНшЦ·\УйАЦ\УЕїбКУЖµ.url
  • %APPDATA%\360se\data\360sefav.db
  • %APPDATA%\SogouExplorer\config.xml
  • %APPDATA%\SogouExplorer\configlocal.xml
  • %APPDATA%\SogouExplorer\CommCfg.xml
  • %APPDATA%\SogouExplorer\Favorite2.dat
  • %HOMEPATH%\Start Menu\МФ±¦НшВтјТ№єОпЦъКЦ(ВМЙ«Гв°ІЧ°°ж).exe
  • C:\Downloads\МФ±¦НшВтјТ№єОпЦъКЦ(ВМЙ«Гв°ІЧ°°ж).exe
  • %APPDATA%\Tencent\TencentTraveler\100\TtConf.dat
  • %APPDATA%\Maxthon3\Users\guest\Config\config.dat
  • %APPDATA%\Maxthon3\Users\guest\Config\config.ini
  • %APPDATA%\Maxthon3\Users\guest\Favorite\Favorite.dat
  • %APPDATA%\Maxthon3\Users\guest\Favorite\tempfb.dat
  • <LS_APPDATA>\Google\Chrome\User Data\Default\Bookmarks
  • <LS_APPDATA>\Google\Chrome\User Data\Default\Preferences
  • %APPDATA%\Apple Computer\Preferences\com.apple.Safari.plist
  • %APPDATA%\Apple Computer\Safari\Bookmarks.plist
  • %APPDATA%\Opera\Opera\search.ini
  • %TEMP%\nsw2.tmp\nsRandom.dll
  • %APPDATA%\98024\Desktop.ini
  • %APPDATA%\98024\№¤ѕЯ\»ЄѕьИнјюФ°.url
  • %HOMEPATH%\98024\ИИГЕУОП·.lnk
Deletes the following files:
  • %TEMP%\nsw2.tmp\nsRandom.dll
Miscellaneous:
Creates and executes the following:
  • '%ProgramFiles%\UUCSSS\ModBNAMEVVK.exe'

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android