Technical Information
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce] 'wextract_cleanup0' = 'rundll32.exe <SYSTEM32>\advpack.dll,DelNodeRunDLL32 "%TEMP%\IXP000.TMP\"'
- '%TEMP%\abtqt.exe' (downloaded from the Internet)
- '%TEMP%\uvlehkwl.exe' (downloaded from the Internet)
- '%TEMP%\vrwxoq.exe' (downloaded from the Internet)
- '%TEMP%\-1998166001' (downloaded from the Internet)
- '%TEMP%\ssetnkk.exe' (downloaded from the Internet)
- '%TEMP%\osycf.exe' (downloaded from the Internet)
- '%TEMP%\exthys.exe' (downloaded from the Internet)
- '%TEMP%\xbgmq.exe' (downloaded from the Internet)
- '%TEMP%\vtlvd.exe' (downloaded from the Internet)
- '%TEMP%\spdrx.exe' (downloaded from the Internet)
- '%TEMP%\wakh.exe' (downloaded from the Internet)
- '%TEMP%\rxmmcs.exe' (downloaded from the Internet)
- '%TEMP%\abtqt.exe'
- '%TEMP%\uvlehkwl.exe'
- '%TEMP%\vrwxoq.exe'
- '%TEMP%\osycf.exe'
- '<SYSTEM32>\cmd.exe' /c del %TEMP%\IXP000.TMP\ppi.exe > nul
- '%TEMP%\-1998166001'
- '%TEMP%\ssetnkk.exe'
- '%TEMP%\xbgmq.exe'
- '%TEMP%\vtlvd.exe'
- '%TEMP%\IXP000.TMP\ppi.exe'
- '%TEMP%\exthys.exe'
- '%TEMP%\spdrx.exe'
- '%TEMP%\wakh.exe'
- '%TEMP%\rxmmcs.exe'
- %TEMP%\uvlehkwl.exe
- %HOMEPATH%\Local Settings\<INETFILES>\Content.IE5\KHMHGZ4F\kksahc[1].php
- %TEMP%\abtqt.exe
- %HOMEPATH%\Local Settings\<INETFILES>\Content.IE5\2VAZY7AN\ffmhcw[1].php
- %TEMP%\vrwxoq.exe
- %HOMEPATH%\Local Settings\<INETFILES>\Content.IE5\YPORKZYZ\kksaupwr[1].php
- %HOMEPATH%\Local Settings\<INETFILES>\Content.IE5\KHMHGZ4F\jjaiqxsq[1].php
- %HOMEPATH%\Local Settings\<INETFILES>\Content.IE5\2VAZY7AN\ptxfnhp[1].php
- %TEMP%\-1998166001
- %HOMEPATH%\Local Settings\<INETFILES>\Content.IE5\YPORKZYZ\vzdlfahpxe[1].php
- %TEMP%\osycf.exe
- %HOMEPATH%\Local Settings\<INETFILES>\Content.IE5\U98D4X8H\gkbjdlwqlt[1].php
- %TEMP%\ssetnkk.exe
- %TEMP%\spdrx.exe
- %TEMP%\vtlvd.exe
- %HOMEPATH%\Local Settings\<INETFILES>\Content.IE5\U98D4X8H\uiptnmgovj[1].php
- %TEMP%\xbgmq.exe
- %TEMP%\IXP000.TMP\ppi1.exe
- %TEMP%\IXP000.TMP\ppi.exe
- %HOMEPATH%\Local Settings\<INETFILES>\Content.IE5\KHMHGZ4F\ggbrzx[1].php
- %HOMEPATH%\Local Settings\<INETFILES>\Content.IE5\2VAZY7AN\gxbjd[1].php
- %HOMEPATH%\Local Settings\<INETFILES>\Content.IE5\KHMHGZ4F\wzdytaicxe[1].php
- %TEMP%\wakh.exe
- %HOMEPATH%\Local Settings\<INETFILES>\Content.IE5\U98D4X8H\iickf[1].php
- %TEMP%\exthys.exe
- %HOMEPATH%\Local Settings\<INETFILES>\Content.IE5\YPORKZYZ\jwrlgbvd[1].php
- %TEMP%\rxmmcs.exe
- %TEMP%\IXP000.TMP\ppi.exe
- 'aa###rogen.com':80
- http://aa###rogen.com/yulgbvqk/jjaiqxsq.php?ad########
- http://aa###rogen.com/yulgbvqk/kksahc.php?ad########
- http://aa###rogen.com/yulgbvqk/kksaupwr.php?ad########
- http://aa###rogen.com/yulgbvqk/vzdlfahpxe.php?ad#################################################
- http://aa###rogen.com/yulgbvqk/ptxfnhp.php?ad########
- http://aa###rogen.com/yulgbvqk/gkbjdlwqlt.php?ad########
- http://aa###rogen.com/yulgbvqk/ffmhcw.php?ad########
- http://aa###rogen.com/yulgbvqk/gxbjd.php?ad########
- http://aa###rogen.com/yulgbvqk/uiptnmgovj.php?ad########
- http://aa###rogen.com/yulgbvqk/ggbrzx.php?ad########
- http://aa###rogen.com/yulgbvqk/iickf.php?ad########
- http://aa###rogen.com/yulgbvqk/wzdytaicxe.php?ad########
- http://aa###rogen.com/yulgbvqk/jwrlgbvd.php?ad########
- DNS ASK aa###rogen.com
- ClassName: 'Shell_TrayWnd' WindowName: ''