Technical Information
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'aeEkEEcE.exe' = '%ALLUSERSPROFILE%\BWogoUMg\aeEkEEcE.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'pUccUkoM.exe' = '%HOMEPATH%\fCkYUMIQ\pUccUkoM.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\FkYQcQph] 'Start' = '00000002'
- hidden files
- file extensions
- User Account Control (UAC)
- '%ALLUSERSPROFILE%\lwQggIEM\nwAEcgMA.exe'
- '%ALLUSERSPROFILE%\BWogoUMg\aeEkEEcE.exe'
- '%HOMEPATH%\fCkYUMIQ\pUccUkoM.exe'
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\lEEEIEUI.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\DqQUUEIU.bat" "<Full path to virus>""
- '<SYSTEM32>\reg.exe' /R /T
- '<SYSTEM32>\reg.exe' %TEMP%\file.vbs
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\ZIocIQIA.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\YWQUcYUs.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\eqMUkgkk.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\isUEgowg.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\gaQcUkQk.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\ieEoIoIo.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\XUQMosEE.bat" "<Full path to virus>""
- '<SYSTEM32>\reg.exe'
- '<SYSTEM32>\reg.exe' /c "<Current directory>\<Virus name>"
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\DMQgokMM.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\UuIAgwwY.bat" "<Full path to virus>""
- '<SYSTEM32>\cscript.exe' add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\HUscsMwU.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\rWskkgoc.bat" "<Full path to virus>""
- '<SYSTEM32>\cscript.exe' /c "<Current directory>\<Virus name>"
- '<SYSTEM32>\reg.exe' <Auxiliary element>
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\aoUEQccs.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\iGosAYQs.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\looMsMUE.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\WWMIogcY.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\legswwkM.bat" "<Full path to virus>""
- '<SYSTEM32>\reg.exe' add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
- '<SYSTEM32>\reg.exe' add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
- '<SYSTEM32>\reg.exe' add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
- '<SYSTEM32>\cscript.exe' %TEMP%\file.vbs
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\OOsEAsIY.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\vysAocgM.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\DYgkAAkw.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\rIkUkYok.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\qYwwAooo.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\ccAAwwkw.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\eSUgoYAQ.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\iIcocMgs.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\NuYUEoAQ.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\oQcoQgIE.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\eUEwkEcU.bat" "<Full path to virus>""
- <SYSTEM32>\cmd.exe
- <SYSTEM32>\cscript.exe
- <SYSTEM32>\reg.exe
- %TEMP%\AgQAsoAQ.bat
- <Current directory>\ecUk.ico
- <Current directory>\tAUC.exe
- %TEMP%\ieEoIoIo.bat
- %TEMP%\qkQcMUYY.bat
- %TEMP%\gaQcUkQk.bat
- %TEMP%\lEEEIEUI.bat
- %TEMP%\USIUkAgM.bat
- %TEMP%\VaYEkEQI.bat
- C:\RCX8.tmp
- %TEMP%\DqQUUEIU.bat
- %TEMP%\bkskQIAg.bat
- C:\RCX7.tmp
- %TEMP%\IIIAscgI.bat
- %TEMP%\eqMUkgkk.bat
- %TEMP%\sQokYUck.bat
- <Current directory>\HsIc.exe
- C:\RCX6.tmp
- %TEMP%\qYwwAooo.bat
- %TEMP%\gkEkYUEM.bat
- %TEMP%\isUEgowg.bat
- <Current directory>\LMIo.exe
- %TEMP%\YWQUcYUs.bat
- %TEMP%\luAkEsMM.bat
- <Current directory>\fekA.ico
- %TEMP%\ZIocIQIA.bat
- <Current directory>\PIwS.exe
- C:\RCXB.tmp
- %TEMP%\YWoAcwQU.bat
- C:\RCXA.tmp
- %TEMP%\sgIAUgcA.bat
- <Current directory>\TMgs.ico
- <Current directory>\ACEI.ico
- <Current directory>\fYgQ.exe
- C:\RCXC.tmp
- %TEMP%\UuIAgwwY.bat
- %TEMP%\DMQgokMM.bat
- %TEMP%\JmEsMIww.bat
- <Current directory>\Kwkg.exe
- <Current directory>\iIsq.exe
- C:\RCX9.tmp
- %TEMP%\rWskkgoc.bat
- %TEMP%\yWQwoUIg.bat
- <Current directory>\GScA.ico
- %TEMP%\HUscsMwU.bat
- %TEMP%\XUQMosEE.bat
- %TEMP%\oEIMEYYE.bat
- <Current directory>\qMgU.ico
- %TEMP%\zaEYMkUA.bat
- <Auxiliary element>
- %TEMP%\LMkEQkoM.bat
- <Current directory>\mask.ico
- %ALLUSERSPROFILE%\casg.txt
- %TEMP%\legswwkM.bat
- <Current directory>\EUcA.ico
- C:\RCX1.tmp
- %TEMP%\looMsMUE.bat
- %TEMP%\Wyckgwok.bat
- %TEMP%\WWMIogcY.bat
- %TEMP%\qQAEUUUc.bat
- %TEMP%\iIcocMgs.bat
- %TEMP%\VoUkIkAc.bat
- <Current directory>\WMgo.exe
- C:\RCX2.tmp
- %TEMP%\mQYsoggg.bat
- <Current directory>\<Virus name>
- %TEMP%\OOsEAsIY.bat
- %TEMP%\file.vbs
- %ALLUSERSPROFILE%\lwQggIEM\nwAEcgMA.exe
- %TEMP%\rocEoEkE.bat
- <Current directory>\toQQ.ico
- %TEMP%\aoUEQccs.bat
- <Current directory>\QUgW.exe
- %TEMP%\jWQskggU.bat
- %TEMP%\iGosAYQs.bat
- %TEMP%\vUYQkUYE.bat
- %TEMP%\WkYUcMMY.bat
- %TEMP%\qmcYIUQg.bat
- <Current directory>\bCQU.ico
- %TEMP%\vysAocgM.bat
- %TEMP%\FWQYUQMI.bat
- %TEMP%\DYgkAAkw.bat
- %TEMP%\nWIUssYI.bat
- %TEMP%\rIkUkYok.bat
- %TEMP%\ccAAwwkw.bat
- %TEMP%\WAkwUoIk.bat
- <Current directory>\OIMc.exe
- C:\RCX5.tmp
- %TEMP%\QAQkcgUg.bat
- %TEMP%\oQcoQgIE.bat
- C:\RCX3.tmp
- %TEMP%\zgIYsEkg.bat
- %TEMP%\NuYUEoAQ.bat
- %TEMP%\eSUgoYAQ.bat
- <Current directory>\QGUQ.ico
- <Current directory>\vwcs.exe
- <Current directory>\Oyck.ico
- <Current directory>\eoME.exe
- C:\RCX4.tmp
- %TEMP%\tikIAcEg.bat
- %TEMP%\eUEwkEcU.bat
- %TEMP%\rAUwEocA.bat
- %ALLUSERSPROFILE%\lwQggIEM\nwAEcgMA.exe
- %ALLUSERSPROFILE%\BWogoUMg\aeEkEEcE.exe
- %HOMEPATH%\fCkYUMIQ\pUccUkoM.exe
- %TEMP%\bkskQIAg.bat
- <Current directory>\fekA.ico
- %TEMP%\AgQAsoAQ.bat
- <Current directory>\tAUC.exe
- %TEMP%\VaYEkEQI.bat
- %TEMP%\USIUkAgM.bat
- <Current directory>\LMIo.exe
- <Current directory>\HsIc.exe
- %TEMP%\luAkEsMM.bat
- %TEMP%\sQokYUck.bat
- %TEMP%\qkQcMUYY.bat
- %TEMP%\gkEkYUEM.bat
- <Current directory>\mask.ico
- <Current directory>\ecUk.ico
- <Current directory>\PIwS.exe
- %TEMP%\YWoAcwQU.bat
- <Current directory>\qMgU.ico
- %TEMP%\oEIMEYYE.bat
- <Current directory>\TMgs.ico
- %TEMP%\JmEsMIww.bat
- <Current directory>\Kwkg.exe
- %TEMP%\LMkEQkoM.bat
- %TEMP%\zaEYMkUA.bat
- %TEMP%\yWQwoUIg.bat
- %TEMP%\sgIAUgcA.bat
- <Current directory>\GScA.ico
- <Current directory>\iIsq.exe
- %TEMP%\WkYUcMMY.bat
- %TEMP%\qQAEUUUc.bat
- %TEMP%\VoUkIkAc.bat
- %TEMP%\zgIYsEkg.bat
- <Current directory>\EUcA.ico
- <Current directory>\WMgo.exe
- %TEMP%\Wyckgwok.bat
- %TEMP%\vUYQkUYE.bat
- %TEMP%\jWQskggU.bat
- %TEMP%\rocEoEkE.bat
- <Current directory>\toQQ.ico
- <Current directory>\QUgW.exe
- %TEMP%\mQYsoggg.bat
- %TEMP%\tikIAcEg.bat
- %TEMP%\WAkwUoIk.bat
- %TEMP%\QAQkcgUg.bat
- %TEMP%\qmcYIUQg.bat
- %TEMP%\IIIAscgI.bat
- <Current directory>\bCQU.ico
- <Current directory>\OIMc.exe
- <Current directory>\Oyck.ico
- %TEMP%\rAUwEocA.bat
- <Current directory>\QGUQ.ico
- <Current directory>\vwcs.exe
- <Current directory>\eoME.exe
- %TEMP%\nWIUssYI.bat
- %TEMP%\FWQYUQMI.bat
- from C:\RCX8.tmp to <Current directory>\tAUC.exe
- from C:\RCX7.tmp to <Current directory>\LMIo.exe
- from C:\RCX9.tmp to <Current directory>\iIsq.exe
- from C:\RCXB.tmp to <Current directory>\PIwS.exe
- from C:\RCXA.tmp to <Current directory>\Kwkg.exe
- from C:\RCX6.tmp to <Current directory>\HsIc.exe
- from C:\RCX2.tmp to <Current directory>\WMgo.exe
- from C:\RCX1.tmp to <Current directory>\QUgW.exe
- from C:\RCX3.tmp to <Current directory>\vwcs.exe
- from C:\RCX5.tmp to <Current directory>\OIMc.exe
- from C:\RCX4.tmp to <Current directory>\eoME.exe
- '19#.#86.45.170':9999
- '74.##5.232.51':80
- '20#.#7.164.69':9999
- '20#.#19.204.12':9999
- 74.##5.232.51/
- DNS ASK google.com
- ClassName: '' WindowName: 'pUccUkoM.exe'
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'Indicator' WindowName: ''
- ClassName: '' WindowName: 'aeEkEEcE.exe'