Technical Information
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe,%ALLUSERSPROFILE%\WuIEgAsU\lacMcYws.exe,'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'lacMcYws.exe' = '%ALLUSERSPROFILE%\WuIEgAsU\lacMcYws.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'SSIkQYgQ.exe' = '%HOMEPATH%\gOEYMkgs\SSIkQYgQ.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\vwYgEQEb] 'ImagePath' = '%ALLUSERSPROFILE%\tuIMYcEM\ZgMYMIIE.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\vwYgEQEb] 'Start' = '00000002'
- C:\Far2\Far.exe
- hidden files
- file extensions
- User Account Control (UAC)
- '<SYSTEM32>\reg.exe' add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
- '<SYSTEM32>\reg.exe' add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
- '<SYSTEM32>\reg.exe' add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
- '<SYSTEM32>\cmd.exe' /c "<Current directory>\<Virus name>"
- '%HOMEPATH%\gOEYMkgs\SSIkQYgQ.exe'
- '%ALLUSERSPROFILE%\WuIEgAsU\lacMcYws.exe'
- '%ALLUSERSPROFILE%\tuIMYcEM\ZgMYMIIE.exe'
- %HOMEPATH%\gOEYMkgs\fcQU.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\skater.bmp.exe
- %HOMEPATH%\gOEYMkgs\MUwM.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\red flower.bmp.exe
- %HOMEPATH%\gOEYMkgs\nsQS.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\guest.bmp.exe
- %HOMEPATH%\gOEYMkgs\owUg.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\snowflake.bmp.exe
- %HOMEPATH%\gOEYMkgs\ickY.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\pink flower.bmp.exe
- %HOMEPATH%\gOEYMkgs\nkEe.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\kick.bmp.exe
- %HOMEPATH%\gOEYMkgs\uYEq.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\horses.bmp.exe
- %HOMEPATH%\gOEYMkgs\aAcC.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\palm tree.bmp.exe
- %HOMEPATH%\gOEYMkgs\roAu.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\lift-off.bmp.exe
- %HOMEPATH%\gOEYMkgs\Rskq.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\%USERNAME%.bmp.exe
- %HOMEPATH%\gOEYMkgs\YkEe.exe
- %TEMP%\eSUcwEYQ.bat
- %HOMEPATH%\gOEYMkgs\GwEU.exe
- %ALLUSERSPROFILE%\Documents\My Pictures\Sample Pictures\Winter.jpg.exe
- %HOMEPATH%\gOEYMkgs\eUwg.exe
- %HOMEPATH%\gOEYMkgs\kcUg.exe
- %HOMEPATH%\gOEYMkgs\gYcK.exe
- %HOMEPATH%\gOEYMkgs\CgYu.exe
- %HOMEPATH%\gOEYMkgs\oMUw.exe
- %ALLUSERSPROFILE%\Documents\My Pictures\Sample Pictures\Water lilies.jpg.exe
- %HOMEPATH%\gOEYMkgs\CIoM.exe
- %ALLUSERSPROFILE%\Documents\My Music\Sample Music\New Stories (Highway Blues).wma.exe
- %HOMEPATH%\gOEYMkgs\Eogi.exe
- %ALLUSERSPROFILE%\Documents\My Music\Sample Music\Beethoven's Symphony No. 9 (Scherzo).wma.exe
- %HOMEPATH%\gOEYMkgs\TMoa.exe
- %ALLUSERSPROFILE%\Documents\My Pictures\Sample Pictures\Sunset.jpg.exe
- %HOMEPATH%\gOEYMkgs\wIMc.exe
- %ALLUSERSPROFILE%\Documents\My Pictures\Sample Pictures\Blue hills.jpg.exe
- %HOMEPATH%\gOEYMkgs\MgsE.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\guitar.bmp.exe
- %HOMEPATH%\gOEYMkgs\kcMu.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\astronaut.bmp.exe
- %HOMEPATH%\gOEYMkgs\lQIc.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\airplane.bmp.exe
- %HOMEPATH%\gOEYMkgs\KYoq.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\beach.bmp.exe
- %HOMEPATH%\gOEYMkgs\ucsm.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\ball.bmp.exe
- %HOMEPATH%\gOEYMkgs\gEMG.exe
- %HOMEPATH%\gOEYMkgs\wgAa.exe
- %HOMEPATH%\gOEYMkgs\SSIkQYgQ.exe
- %ALLUSERSPROFILE%\WuIEgAsU\lacMcYws.exe
- %HOMEPATH%\gOEYMkgs\SSIkQYgQ
- %ALLUSERSPROFILE%\WuIEgAsU\lacMcYws
- %ALLUSERSPROFILE%\tuIMYcEM\ZgMYMIIE.exe
- %TEMP%\PIooscsk.bat
- <Current directory>\<Virus name>
- %ALLUSERSPROFILE%\caQc.txt
- C:\Documents and Settings\LocalService\gOEYMkgs\SSIkQYgQ
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\butterfly.bmp.exe
- %HOMEPATH%\gOEYMkgs\rkYk.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\duck.bmp.exe
- %HOMEPATH%\gOEYMkgs\OgEW.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\drip.bmp.exe
- %HOMEPATH%\gOEYMkgs\jcIe.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\frog.bmp.exe
- %HOMEPATH%\gOEYMkgs\GQQc.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\fish.bmp.exe
- %HOMEPATH%\gOEYMkgs\vcoQ.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\dog.bmp.exe
- %HOMEPATH%\gOEYMkgs\NggC.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\cat.bmp.exe
- %HOMEPATH%\gOEYMkgs\EUQg.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\car.bmp.exe
- %HOMEPATH%\gOEYMkgs\aIou.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\dirt bike.bmp.exe
- %HOMEPATH%\gOEYMkgs\JcEQ.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\chess.bmp.exe
- %HOMEPATH%\gOEYMkgs\Cscq.exe
- %HOMEPATH%\gOEYMkgs\owUg.exe
- %HOMEPATH%\gOEYMkgs\ickY.exe
- %HOMEPATH%\gOEYMkgs\CIoM.exe
- %HOMEPATH%\gOEYMkgs\Eogi.exe
- %HOMEPATH%\gOEYMkgs\nsQS.exe
- %HOMEPATH%\gOEYMkgs\roAu.exe
- %HOMEPATH%\gOEYMkgs\Rskq.exe
- %HOMEPATH%\gOEYMkgs\fcQU.exe
- %HOMEPATH%\gOEYMkgs\MUwM.exe
- %HOMEPATH%\gOEYMkgs\TMoa.exe
- %HOMEPATH%\gOEYMkgs\CgYu.exe
- %HOMEPATH%\gOEYMkgs\eUwg.exe
- %HOMEPATH%\gOEYMkgs\kcUg.exe
- %HOMEPATH%\gOEYMkgs\oMUw.exe
- %TEMP%\eSUcwEYQ.bat
- %HOMEPATH%\gOEYMkgs\wIMc.exe
- %HOMEPATH%\gOEYMkgs\MgsE.exe
- %HOMEPATH%\gOEYMkgs\YkEe.exe
- %HOMEPATH%\gOEYMkgs\GwEU.exe
- %HOMEPATH%\gOEYMkgs\aAcC.exe
- %HOMEPATH%\gOEYMkgs\ucsm.exe
- %HOMEPATH%\gOEYMkgs\gEMG.exe
- %HOMEPATH%\gOEYMkgs\NggC.exe
- %HOMEPATH%\gOEYMkgs\EUQg.exe
- %HOMEPATH%\gOEYMkgs\KYoq.exe
- %HOMEPATH%\gOEYMkgs\wgAa.exe
- %TEMP%\PIooscsk.bat
- %HOMEPATH%\gOEYMkgs\kcMu.exe
- %HOMEPATH%\gOEYMkgs\lQIc.exe
- %HOMEPATH%\gOEYMkgs\aIou.exe
- %HOMEPATH%\gOEYMkgs\GQQc.exe
- %HOMEPATH%\gOEYMkgs\vcoQ.exe
- %HOMEPATH%\gOEYMkgs\nkEe.exe
- %HOMEPATH%\gOEYMkgs\uYEq.exe
- %HOMEPATH%\gOEYMkgs\jcIe.exe
- %HOMEPATH%\gOEYMkgs\JcEQ.exe
- %HOMEPATH%\gOEYMkgs\Cscq.exe
- %HOMEPATH%\gOEYMkgs\rkYk.exe
- %HOMEPATH%\gOEYMkgs\OgEW.exe
- '74.##5.232.51':80
- http://google.com/ via 74.##5.232.51
- http:/// via 74.##5.232.51
- DNS ASK google.com
- ClassName: '' WindowName: 'Microsoft Windows'
- ClassName: '' WindowName: 'SSIkQYgQ.exe'
- ClassName: 'Indicator' WindowName: ''
- ClassName: '' WindowName: 'lacMcYws.exe'