Technical Information
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'AcIcUcAM.exe' = '%ALLUSERSPROFILE%\vesswIQA\AcIcUcAM.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'jaQEcQMQ.exe' = '%HOMEPATH%\NIMMEwsg\jaQEcQMQ.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\FkYQcQph] 'Start' = '00000002'
- hidden files
- file extensions
- User Account Control (UAC)
- '%ALLUSERSPROFILE%\lwQggIEM\nwAEcgMA.exe'
- '%ALLUSERSPROFILE%\vesswIQA\AcIcUcAM.exe'
- '%HOMEPATH%\NIMMEwsg\jaQEcQMQ.exe'
- '<SYSTEM32>\reg.exe'
- '<SYSTEM32>\reg.exe' /pid=2476
- '<SYSTEM32>\cscript.exe' /pid=3996
- '<SYSTEM32>\reg.exe' /pid=2720
- '<SYSTEM32>\cscript.exe' /pid=2652
- '<SYSTEM32>\cscript.exe' /c ""%TEMP%\TgcoYMQc.bat" "<Full path to virus>""
- '<SYSTEM32>\cscript.exe' add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
- '<SYSTEM32>\cscript.exe' add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\zsUcQAQc.bat" "<Full path to virus>""
- '<SYSTEM32>\reg.exe' /pid=4040
- '<SYSTEM32>\reg.exe' /c ""%TEMP%\NsUwgMYI.bat" "<Full path to virus>""
- '<SYSTEM32>\reg.exe' /pid=3860
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\sMEgEoos.bat" "<Full path to virus>""
- '<SYSTEM32>\cscript.exe' add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\XWYQoAcI.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\eUUAoooE.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\iqkAYAAU.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\kuUQIIEM.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\OiYUEIIc.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\hCwUYcEk.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\CywUAUYo.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\NYYowEgA.bat" "<Full path to virus>""
- '<SYSTEM32>\reg.exe' /pid=3016
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\dcMwkUAQ.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\UuIQYUow.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\eeswsgok.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\rqAkcMkk.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\SecMkIMc.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\tiQQUMEw.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\kqgoIgAk.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\XWcYEgYY.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\iqAYoYQM.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\xUkIIIYA.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\RIgwMQQU.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\ZKEsEksQ.bat" "<Full path to virus>""
- '<SYSTEM32>\reg.exe' add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
- '<SYSTEM32>\reg.exe' add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
- '<SYSTEM32>\reg.exe' add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\AGEkgIoA.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\SeQkgwUw.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\vqEsEwEE.bat" "<Full path to virus>""
- '<SYSTEM32>\cscript.exe' %TEMP%\file.vbs
- '<SYSTEM32>\reg.exe' /pid=3456
- '<SYSTEM32>\reg.exe' /pid=3308
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\ZkwIkgMQ.bat" "<Full path to virus>""
- '<SYSTEM32>\reg.exe' /pid=3796
- '<SYSTEM32>\reg.exe' /pid=3904
- '<SYSTEM32>\reg.exe' /pid=3744
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\BcIIEEAw.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\rEggQcAQ.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\dyUUAAsk.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\omEkAgQY.bat" "<Full path to virus>""
- '<SYSTEM32>\reg.exe' /c "<Current directory>\<Virus name>"
- '<SYSTEM32>\reg.exe' /pid=3024
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\DEIIQcMk.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\FcAsAsAY.bat" "<Full path to virus>""
- <SYSTEM32>\cscript.exe
- <SYSTEM32>\cmd.exe
- <SYSTEM32>\reg.exe
- <Current directory>\PuQM.ico
- <Current directory>\ekYU.exe
- C:\RCX2C.tmp
- %TEMP%\UuIQYUow.bat
- <Current directory>\MGME.ico
- <Current directory>\pQQU.exe
- C:\RCX2D.tmp
- %TEMP%\HEwosMoQ.bat
- <Current directory>\bssE.exe
- <Current directory>\eQwE.exe
- C:\RCX2A.tmp
- <Current directory>\tyQY.ico
- %TEMP%\xUMockMQ.bat
- C:\RCX2B.tmp
- <Current directory>\Quoc.ico
- <Current directory>\NIco.ico
- <Current directory>\dIYS.exe
- C:\RCX31.tmp
- <Current directory>\zEYU.ico
- <Current directory>\RUcY.ico
- <Current directory>\XYUs.exe
- %TEMP%\rqAkcMkk.bat
- %TEMP%\dssgsQMg.bat
- <Current directory>\xcgm.exe
- C:\RCX32.tmp
- C:\RCX30.tmp
- <Current directory>\cEYi.exe
- C:\RCX2F.tmp
- C:\RCX2E.tmp
- <Current directory>\XswQ.ico
- <Current directory>\FOks.ico
- <Current directory>\qEEQ.exe
- %TEMP%\SecMkIMc.bat
- %TEMP%\tgcEEcww.bat
- %TEMP%\NYYowEgA.bat
- C:\RCX23.tmp
- <Current directory>\DogM.ico
- <Current directory>\PMAG.exe
- %TEMP%\umQUgQgI.bat
- <Current directory>\NGwc.ico
- <Current directory>\ckgc.exe
- <Current directory>\SQkg.exe
- C:\RCX24.tmp
- <Current directory>\kyYc.ico
- <Current directory>\mUwW.exe
- C:\RCX21.tmp
- <Current directory>\yEgQ.ico
- %TEMP%\NsUwgMYI.bat
- C:\RCX22.tmp
- %TEMP%\sMEgEoos.bat
- <Current directory>\FmEI.ico
- <Current directory>\UoUW.exe
- <Current directory>\QIsg.exe
- C:\RCX28.tmp
- <Current directory>\hYUc.ico
- %TEMP%\dcMwkUAQ.bat
- <Current directory>\ToUU.exe
- C:\RCX29.tmp
- %TEMP%\bKMwwAoI.bat
- <Current directory>\KacI.ico
- C:\RCX27.tmp
- %TEMP%\yKsIcgQw.bat
- <Current directory>\ecsg.ico
- C:\RCX25.tmp
- %TEMP%\TgcoYMQc.bat
- <Current directory>\XCcs.ico
- <Current directory>\ksQu.exe
- <Current directory>\assM.exe
- C:\RCX26.tmp
- <Current directory>\cAwM.ico
- <Current directory>\EkIQ.ico
- <Current directory>\kcYA.exe
- C:\RCX3E.tmp
- %TEMP%\UGoQsEMQ.bat
- <Current directory>\OUYG.exe
- C:\RCX40.tmp
- C:\RCX3F.tmp
- <Current directory>\HEok.ico
- <Current directory>\EUkE.exe
- C:\RCX3C.tmp
- <Current directory>\noIQ.ico
- %TEMP%\kuUQIIEM.bat
- <Current directory>\EgwQ.exe
- <Current directory>\hUQc.ico
- %TEMP%\CywUAUYo.bat
- <Current directory>\MEAM.exe
- C:\RCX3D.tmp
- C:\RCX43.tmp
- %TEMP%\mKkgsswY.bat
- %TEMP%\OiYUEIIc.bat
- <Current directory>\JoYk.exe
- C:\RCX44.tmp
- %TEMP%\SUEMoAsg.bat
- <Current directory>\oGkI.ico
- <Current directory>\icEk.exe
- <Current directory>\sGYk.ico
- <Current directory>\TcQW.exe
- C:\RCX41.tmp
- %TEMP%\hCwUYcEk.bat
- <Current directory>\esUE.ico
- <Current directory>\DQAw.exe
- C:\RCX42.tmp
- %TEMP%\RcYUokQE.bat
- <Current directory>\MIYo.ico
- <Current directory>\sGMY.ico
- <Current directory>\hQYM.exe
- C:\RCX36.tmp
- %TEMP%\diMIEsgk.bat
- <Current directory>\zuws.ico
- %TEMP%\iqkAYAAU.bat
- C:\RCX37.tmp
- <Current directory>\zGII.ico
- <Current directory>\bYYS.exe
- %TEMP%\eeswsgok.bat
- <Current directory>\zgAo.ico
- <Current directory>\wMwm.exe
- <Current directory>\Skcs.exe
- C:\RCX33.tmp
- <Current directory>\XQsQ.exe
- C:\RCX35.tmp
- C:\RCX34.tmp
- <Current directory>\SIME.ico
- C:\RCX3A.tmp
- <Current directory>\ucAM.ico
- <Current directory>\MAwk.ico
- <Current directory>\JkkK.exe
- C:\RCX3B.tmp
- %TEMP%\EaQIkYQU.bat
- <Current directory>\PMUO.exe
- %TEMP%\XWYQoAcI.bat
- %TEMP%\hqcUccgE.bat
- <Current directory>\doQi.exe
- C:\RCX38.tmp
- %TEMP%\BmgwEEMs.bat
- <Current directory>\dqAg.ico
- C:\RCX39.tmp
- %TEMP%\eUUAoooE.bat
- <Current directory>\aocU.ico
- <Current directory>\KwYc.exe
- %TEMP%\LEEEYYUU.bat
- %TEMP%\xiAkQYcg.bat
- <Current directory>\XGkM.ico
- C:\RCXA.tmp
- %TEMP%\kqgoIgAk.bat
- <Current directory>\miMg.ico
- <Current directory>\HEsk.exe
- <Current directory>\mQwG.exe
- C:\RCXB.tmp
- <Current directory>\Bocq.exe
- %TEMP%\vuAMkocw.bat
- C:\RCX8.tmp
- <Current directory>\ZcoA.ico
- <Current directory>\JAEW.exe
- C:\RCX9.tmp
- <Current directory>\hmQw.ico
- <Current directory>\lkIY.ico
- <Current directory>\GcAa.exe
- C:\RCXF.tmp
- %TEMP%\euUQsMEk.bat
- <Current directory>\PKMw.ico
- <Current directory>\Vosq.exe
- <Current directory>\FccS.exe
- C:\RCX10.tmp
- <Current directory>\SakE.ico
- %TEMP%\iqAYoYQM.bat
- C:\RCXE.tmp
- <Current directory>\IKYU.ico
- <Current directory>\msgu.exe
- C:\RCXC.tmp
- %TEMP%\tiQQUMEw.bat
- <Current directory>\BoQA.ico
- <Current directory>\dwUA.exe
- %TEMP%\mAkkEckU.bat
- C:\RCXD.tmp
- C:\RCX7.tmp
- %TEMP%\CssIsIAU.bat
- <Current directory>\NMYa.exe
- %TEMP%\vqEsEwEE.bat
- <Current directory>\AQUo.ico
- <Current directory>\iEkI.exe
- C:\RCX2.tmp
- C:\RCX1.tmp
- <Current directory>\giUI.ico
- %ALLUSERSPROFILE%\casg.txt
- %TEMP%\nIgEAscQ.bat
- <Current directory>\<Virus name>
- %ALLUSERSPROFILE%\lwQggIEM\nwAEcgMA.exe
- %TEMP%\file.vbs
- %TEMP%\zmosgwAA.bat
- %TEMP%\KeAAwUAQ.bat
- %TEMP%\AGEkgIoA.bat
- <Current directory>\Mokg.ico
- <Current directory>\AIoK.exe
- <Current directory>\ucAc.exe
- C:\RCX5.tmp
- <Current directory>\XmgI.ico
- <Current directory>\toQg.exe
- C:\RCX6.tmp
- %TEMP%\XWcYEgYY.bat
- <Current directory>\QosY.ico
- <Current directory>\NsgG.exe
- C:\RCX3.tmp
- %TEMP%\SeQkgwUw.bat
- <Current directory>\ByUI.ico
- <Current directory>\RcIw.exe
- C:\RCX4.tmp
- %TEMP%\YMsEogYo.bat
- <Current directory>\ReoU.ico
- %TEMP%\ZKEsEksQ.bat
- <Current directory>\gAAM.exe
- C:\RCX1C.tmp
- %TEMP%\bUUUYcUU.bat
- <Current directory>\TcME.ico
- <Current directory>\zcMY.ico
- <Current directory>\rcEw.exe
- %TEMP%\FcAsAsAY.bat
- %TEMP%\DEIIQcMk.bat
- C:\RCX1B.tmp
- %TEMP%\UQEocswM.bat
- <Current directory>\uEUo.ico
- %TEMP%\KqEIkkQE.bat
- %TEMP%\rEggQcAQ.bat
- <Current directory>\KUko.ico
- <Current directory>\kkUw.exe
- <Current directory>\CUcI.exe
- C:\RCX1A.tmp
- %TEMP%\AsQMcosE.bat
- <Current directory>\IcQk.ico
- C:\RCX1F.tmp
- %TEMP%\BcIIEEAw.bat
- %TEMP%\zsUcQAQc.bat
- %TEMP%\eMUkQMAs.bat
- <Current directory>\FMIO.exe
- C:\RCX20.tmp
- %TEMP%\ZkwIkgMQ.bat
- <Current directory>\iAQE.ico
- <Current directory>\UkEY.exe
- C:\RCX1D.tmp
- %TEMP%\BaEkcgIM.bat
- <Current directory>\Jsku.exe
- %TEMP%\HCkUEUYo.bat
- C:\RCX1E.tmp
- <Current directory>\UOMQ.ico
- %TEMP%\dyUUAAsk.bat
- <Current directory>\rSMY.ico
- <Current directory>\scwm.exe
- C:\RCX13.tmp
- %TEMP%\bswMQQgk.bat
- %TEMP%\xUkIIIYA.bat
- <Current directory>\GgUU.ico
- %TEMP%\RIgwMQQU.bat
- C:\RCX14.tmp
- <Current directory>\PEwY.exe
- <Current directory>\CEYA.exe
- C:\RCX11.tmp
- <Current directory>\pwEg.ico
- %TEMP%\OSAsAMwI.bat
- C:\RCX12.tmp
- <Current directory>\teco.ico
- <Current directory>\Kscg.ico
- <Current directory>\zYQW.exe
- C:\RCX18.tmp
- %TEMP%\GCMQkgog.bat
- <Current directory>\fwkc.ico
- <Current directory>\VcQm.exe
- <Current directory>\ZcMA.exe
- C:\RCX19.tmp
- %TEMP%\omEkAgQY.bat
- <Current directory>\rmYU.ico
- C:\RCX17.tmp
- %TEMP%\iMcoocgM.bat
- <Current directory>\WuoM.ico
- <Current directory>\zowk.exe
- C:\RCX15.tmp
- <Current directory>\aaAY.ico
- <Current directory>\Xgkc.exe
- <Current directory>\YUsO.exe
- C:\RCX16.tmp
- %ALLUSERSPROFILE%\lwQggIEM\nwAEcgMA.exe
- %ALLUSERSPROFILE%\vesswIQA\AcIcUcAM.exe
- %HOMEPATH%\NIMMEwsg\jaQEcQMQ.exe
- <Current directory>\ekYU.exe
- <Current directory>\Quoc.ico
- <Current directory>\PuQM.ico
- <Current directory>\pQQU.exe
- %TEMP%\HEwosMoQ.bat
- %TEMP%\xUMockMQ.bat
- <Current directory>\tyQY.ico
- <Current directory>\dIYS.exe
- <Current directory>\bssE.exe
- <Current directory>\NIco.ico
- <Current directory>\MGME.ico
- <Current directory>\RUcY.ico
- <Current directory>\XYUs.exe
- <Current directory>\xcgm.exe
- <Current directory>\Skcs.exe
- <Current directory>\zEYU.ico
- <Current directory>\XswQ.ico
- <Current directory>\cEYi.exe
- <Current directory>\qEEQ.exe
- <Current directory>\FOks.ico
- %TEMP%\tgcEEcww.bat
- <Current directory>\eQwE.exe
- <Current directory>\DogM.ico
- <Current directory>\SQkg.exe
- %TEMP%\NsUwgMYI.bat
- <Current directory>\NGwc.ico
- <Current directory>\ckgc.exe
- <Current directory>\FmEI.ico
- <Current directory>\UoUW.exe
- %TEMP%\umQUgQgI.bat
- <Current directory>\kyYc.ico
- <Current directory>\PMAG.exe
- <Current directory>\assM.exe
- %TEMP%\bKMwwAoI.bat
- <Current directory>\hYUc.ico
- <Current directory>\ToUU.exe
- %TEMP%\TgcoYMQc.bat
- <Current directory>\KacI.ico
- %TEMP%\yKsIcgQw.bat
- <Current directory>\ecsg.ico
- <Current directory>\ksQu.exe
- <Current directory>\QIsg.exe
- <Current directory>\XCcs.ico
- %TEMP%\UGoQsEMQ.bat
- <Current directory>\hUQc.ico
- <Current directory>\kcYA.exe
- <Current directory>\OUYG.exe
- <Current directory>\EkIQ.ico
- <Current directory>\sGMY.ico
- %TEMP%\EaQIkYQU.bat
- <Current directory>\MEAM.exe
- <Current directory>\EUkE.exe
- <Current directory>\noIQ.ico
- <Current directory>\HEok.ico
- <Current directory>\sGYk.ico
- <Current directory>\JoYk.exe
- %TEMP%\mKkgsswY.bat
- <Current directory>\oGkI.ico
- <Current directory>\icEk.exe
- <Current directory>\esUE.ico
- <Current directory>\TcQW.exe
- %TEMP%\RcYUokQE.bat
- <Current directory>\MIYo.ico
- <Current directory>\DQAw.exe
- <Current directory>\EgwQ.exe
- %TEMP%\diMIEsgk.bat
- <Current directory>\SIME.ico
- <Current directory>\hQYM.exe
- <Current directory>\bYYS.exe
- <Current directory>\zuws.ico
- %TEMP%\dssgsQMg.bat
- <Current directory>\cAwM.ico
- <Current directory>\wMwm.exe
- <Current directory>\XQsQ.exe
- <Current directory>\zgAo.ico
- <Current directory>\zGII.ico
- <Current directory>\JkkK.exe
- %TEMP%\hqcUccgE.bat
- <Current directory>\MAwk.ico
- <Current directory>\ucAM.ico
- <Current directory>\PMUO.exe
- <Current directory>\doQi.exe
- %TEMP%\BmgwEEMs.bat
- <Current directory>\dqAg.ico
- <Current directory>\aocU.ico
- <Current directory>\KwYc.exe
- <Current directory>\yEgQ.ico
- <Current directory>\XGkM.ico
- <Current directory>\mQwG.exe
- <Current directory>\HEsk.exe
- <Current directory>\msgu.exe
- <Current directory>\miMg.ico
- <Current directory>\lkIY.ico
- <Current directory>\GcAa.exe
- <Current directory>\Bocq.exe
- %TEMP%\xiAkQYcg.bat
- <Current directory>\hmQw.ico
- <Current directory>\IKYU.ico
- <Current directory>\FccS.exe
- %TEMP%\euUQsMEk.bat
- <Current directory>\SakE.ico
- <Current directory>\pwEg.ico
- <Current directory>\CEYA.exe
- <Current directory>\dwUA.exe
- %TEMP%\mAkkEckU.bat
- <Current directory>\BoQA.ico
- <Current directory>\PKMw.ico
- <Current directory>\Vosq.exe
- %TEMP%\vuAMkocw.bat
- <Current directory>\iEkI.exe
- %TEMP%\CssIsIAU.bat
- <Current directory>\giUI.ico
- <Current directory>\ByUI.ico
- <Current directory>\NsgG.exe
- %TEMP%\KeAAwUAQ.bat
- %TEMP%\nIgEAscQ.bat
- %TEMP%\zmosgwAA.bat
- <Current directory>\AQUo.ico
- <Current directory>\NMYa.exe
- <Current directory>\RcIw.exe
- <Current directory>\toQg.exe
- <Current directory>\Mokg.ico
- <Current directory>\XmgI.ico
- <Current directory>\ZcoA.ico
- <Current directory>\JAEW.exe
- %TEMP%\YMsEogYo.bat
- <Current directory>\ReoU.ico
- <Current directory>\ucAc.exe
- <Current directory>\AIoK.exe
- <Current directory>\QosY.ico
- <Current directory>\TcME.ico
- <Current directory>\gAAM.exe
- <Current directory>\rcEw.exe
- %TEMP%\BaEkcgIM.bat
- <Current directory>\zcMY.ico
- <Current directory>\uEUo.ico
- <Current directory>\CUcI.exe
- <Current directory>\kkUw.exe
- %TEMP%\bUUUYcUU.bat
- <Current directory>\KUko.ico
- <Current directory>\UkEY.exe
- <Current directory>\FMIO.exe
- %TEMP%\eMUkQMAs.bat
- <Current directory>\IcQk.ico
- <Current directory>\mUwW.exe
- %TEMP%\LEEEYYUU.bat
- <Current directory>\Jsku.exe
- <Current directory>\iAQE.ico
- <Current directory>\UOMQ.ico
- %TEMP%\AsQMcosE.bat
- %TEMP%\HCkUEUYo.bat
- %TEMP%\UQEocswM.bat
- <Current directory>\scwm.exe
- <Current directory>\teco.ico
- <Current directory>\rSMY.ico
- <Current directory>\GgUU.ico
- <Current directory>\zowk.exe
- <Current directory>\zYQW.exe
- %TEMP%\OSAsAMwI.bat
- <Current directory>\Kscg.ico
- %TEMP%\bswMQQgk.bat
- <Current directory>\PEwY.exe
- %TEMP%\iMcoocgM.bat
- <Current directory>\fwkc.ico
- %TEMP%\GCMQkgog.bat
- <Current directory>\ZcMA.exe
- %TEMP%\KqEIkkQE.bat
- <Current directory>\rmYU.ico
- <Current directory>\WuoM.ico
- <Current directory>\YUsO.exe
- <Current directory>\Xgkc.exe
- <Current directory>\VcQm.exe
- <Current directory>\aaAY.ico
- from C:\RCX2E.tmp to <Current directory>\pQQU.exe
- from C:\RCX2F.tmp to <Current directory>\cEYi.exe
- from C:\RCX2C.tmp to <Current directory>\bssE.exe
- from C:\RCX2D.tmp to <Current directory>\ekYU.exe
- from C:\RCX32.tmp to <Current directory>\xcgm.exe
- from C:\RCX33.tmp to <Current directory>\Skcs.exe
- from C:\RCX30.tmp to <Current directory>\qEEQ.exe
- from C:\RCX31.tmp to <Current directory>\XYUs.exe
- from C:\RCX2B.tmp to <Current directory>\dIYS.exe
- from C:\RCX25.tmp to <Current directory>\ckgc.exe
- from C:\RCX26.tmp to <Current directory>\assM.exe
- from C:\RCX23.tmp to <Current directory>\PMAG.exe
- from C:\RCX24.tmp to <Current directory>\SQkg.exe
- from C:\RCX29.tmp to <Current directory>\ToUU.exe
- from C:\RCX2A.tmp to <Current directory>\eQwE.exe
- from C:\RCX27.tmp to <Current directory>\ksQu.exe
- from C:\RCX28.tmp to <Current directory>\QIsg.exe
- from C:\RCX3F.tmp to <Current directory>\kcYA.exe
- from C:\RCX40.tmp to <Current directory>\OUYG.exe
- from C:\RCX3D.tmp to <Current directory>\MEAM.exe
- from C:\RCX3E.tmp to <Current directory>\EUkE.exe
- from C:\RCX43.tmp to <Current directory>\JoYk.exe
- from C:\RCX44.tmp to <Current directory>\icEk.exe
- from C:\RCX41.tmp to <Current directory>\TcQW.exe
- from C:\RCX42.tmp to <Current directory>\DQAw.exe
- from C:\RCX3C.tmp to <Current directory>\EgwQ.exe
- from C:\RCX36.tmp to <Current directory>\hQYM.exe
- from C:\RCX37.tmp to <Current directory>\bYYS.exe
- from C:\RCX34.tmp to <Current directory>\wMwm.exe
- from C:\RCX35.tmp to <Current directory>\XQsQ.exe
- from C:\RCX3A.tmp to <Current directory>\JkkK.exe
- from C:\RCX3B.tmp to <Current directory>\PMUO.exe
- from C:\RCX38.tmp to <Current directory>\doQi.exe
- from C:\RCX39.tmp to <Current directory>\KwYc.exe
- from C:\RCXC.tmp to <Current directory>\HEsk.exe
- from C:\RCXD.tmp to <Current directory>\msgu.exe
- from C:\RCXA.tmp to <Current directory>\Bocq.exe
- from C:\RCXB.tmp to <Current directory>\mQwG.exe
- from C:\RCX10.tmp to <Current directory>\FccS.exe
- from C:\RCX11.tmp to <Current directory>\CEYA.exe
- from C:\RCXE.tmp to <Current directory>\dwUA.exe
- from C:\RCXF.tmp to <Current directory>\Vosq.exe
- from C:\RCX9.tmp to <Current directory>\GcAa.exe
- from C:\RCX3.tmp to <Current directory>\NsgG.exe
- from C:\RCX4.tmp to <Current directory>\RcIw.exe
- from C:\RCX1.tmp to <Current directory>\NMYa.exe
- from C:\RCX2.tmp to <Current directory>\iEkI.exe
- from C:\RCX7.tmp to <Current directory>\toQg.exe
- from C:\RCX8.tmp to <Current directory>\JAEW.exe
- from C:\RCX5.tmp to <Current directory>\ucAc.exe
- from C:\RCX6.tmp to <Current directory>\AIoK.exe
- from C:\RCX1D.tmp to <Current directory>\rcEw.exe
- from C:\RCX1E.tmp to <Current directory>\UkEY.exe
- from C:\RCX1B.tmp to <Current directory>\kkUw.exe
- from C:\RCX1C.tmp to <Current directory>\gAAM.exe
- from C:\RCX21.tmp to <Current directory>\mUwW.exe
- from C:\RCX22.tmp to <Current directory>\UoUW.exe
- from C:\RCX1F.tmp to <Current directory>\Jsku.exe
- from C:\RCX20.tmp to <Current directory>\FMIO.exe
- from C:\RCX1A.tmp to <Current directory>\CUcI.exe
- from C:\RCX14.tmp to <Current directory>\scwm.exe
- from C:\RCX15.tmp to <Current directory>\zowk.exe
- from C:\RCX12.tmp to <Current directory>\zYQW.exe
- from C:\RCX13.tmp to <Current directory>\PEwY.exe
- from C:\RCX18.tmp to <Current directory>\VcQm.exe
- from C:\RCX19.tmp to <Current directory>\ZcMA.exe
- from C:\RCX16.tmp to <Current directory>\YUsO.exe
- from C:\RCX17.tmp to <Current directory>\Xgkc.exe
- '74.##5.232.51':80
- 74.##5.232.51/
- DNS ASK google.com
- ClassName: '' WindowName: 'Microsoft Windows'
- ClassName: '' WindowName: 'jaQEcQMQ.exe'
- ClassName: 'Indicator' WindowName: ''
- ClassName: '' WindowName: 'AcIcUcAM.exe'