Technical Information
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'aeEkEEcE.exe' = '%ALLUSERSPROFILE%\BWogoUMg\aeEkEEcE.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'pUccUkoM.exe' = '%HOMEPATH%\fCkYUMIQ\pUccUkoM.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\FkYQcQph] 'Start' = '00000002'
- hidden files
- file extensions
- User Account Control (UAC)
- '%ALLUSERSPROFILE%\lwQggIEM\nwAEcgMA.exe'
- '%ALLUSERSPROFILE%\BWogoUMg\aeEkEEcE.exe'
- '%HOMEPATH%\fCkYUMIQ\pUccUkoM.exe'
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\iaggokEM.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\wWgMMIkE.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\VOAYEIUM.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\WqAokcMo.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\mckQIwcY.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\MwskYsck.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\fwkEskoI.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\OgcUcUYw.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\yIUIAQMA.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\BOwQEsQE.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\xYMIgAQc.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\jcAAAYIc.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\digcQggE.bat" "<Full path to virus>""
- '<SYSTEM32>\cscript.exe' %TEMP%\file.vbs
- '<SYSTEM32>\reg.exe' add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
- '<SYSTEM32>\reg.exe' add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
- '<SYSTEM32>\reg.exe' add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\QIMoUMko.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\PMgsUQwE.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\UcIoYYAw.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\RQkQoUEU.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\RIoAMYsY.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\MIUEIQcY.bat" "<Full path to virus>""
- %TEMP%\MwskYsck.bat
- %TEMP%\nsEgQosg.bat
- <Current directory>\OKMY.ico
- C:\RCXF.tmp
- %TEMP%\wWgMMIkE.bat
- <Current directory>\VMIs.ico
- <Current directory>\RcUE.exe
- <Current directory>\SCkg.ico
- <Current directory>\MAso.exe
- C:\RCX11.tmp
- %TEMP%\mEAgkQQw.bat
- <Current directory>\PsMU.exe
- C:\RCX10.tmp
- %TEMP%\BOwQEsQE.bat
- %TEMP%\hwcQYMcY.bat
- <Current directory>\wgQq.exe
- C:\RCXC.tmp
- %TEMP%\iaggokEM.bat
- %TEMP%\VOAYEIUM.bat
- C:\RCXB.tmp
- %TEMP%\YQIUEggI.bat
- <Current directory>\ZIsE.ico
- <Current directory>\CqoI.ico
- <Current directory>\IAQO.exe
- C:\RCXE.tmp
- C:\RCXD.tmp
- %TEMP%\LQIIQocc.bat
- <Current directory>\XGMU.ico
- <Current directory>\ecoO.exe
- <Current directory>\NkQK.exe
- %TEMP%\OgcUcUYw.bat
- C:\RCX16.tmp
- <Current directory>\VUAc.ico
- <Current directory>\qEUM.exe
- C:\RCX15.tmp
- %TEMP%\jisAEgkM.bat
- <Current directory>\IAUc.ico
- <Current directory>\tsUy.exe
- C:\RCX18.tmp
- %TEMP%\oGAQMIgw.bat
- <Current directory>\okcA.ico
- <Current directory>\Mcge.exe
- C:\RCX17.tmp
- <Current directory>\ieco.ico
- C:\RCX12.tmp
- <Current directory>\XiIQ.ico
- <Current directory>\kgUY.exe
- %TEMP%\OsQkMQUs.bat
- %TEMP%\xYMIgAQc.bat
- <Current directory>\hOMQ.ico
- <Current directory>\HcEQ.exe
- <Current directory>\QskE.exe
- C:\RCX14.tmp
- %TEMP%\fwkEskoI.bat
- %TEMP%\mWAEIsIw.bat
- C:\RCX13.tmp
- %TEMP%\yIUIAQMA.bat
- <Current directory>\ACEM.ico
- <Current directory>\PwIS.exe
- C:\RCX2.tmp
- %TEMP%\KicIgosw.bat
- %TEMP%\RQkQoUEU.bat
- %ALLUSERSPROFILE%\casg.txt
- <Current directory>\WCEw.ico
- %TEMP%\PIIMUQco.bat
- <Current directory>\Pysw.ico
- <Current directory>\tUgw.exe
- C:\RCX4.tmp
- %TEMP%\PMgsUQwE.bat
- <Current directory>\quok.ico
- <Current directory>\rEQc.exe
- C:\RCX3.tmp
- %TEMP%\MIUEIQcY.bat
- %TEMP%\digcQggE.bat
- %TEMP%\file.vbs
- %TEMP%\dugMgYsQ.bat
- <Current directory>\<Virus name>
- %ALLUSERSPROFILE%\lwQggIEM\nwAEcgMA.exe
- %TEMP%\tWwEIQEA.bat
- %TEMP%\KUgoMwUk.bat
- <Current directory>\rQEY.exe
- C:\RCX1.tmp
- %TEMP%\RIoAMYsY.bat
- %TEMP%\QIMoUMko.bat
- %TEMP%\CuYQMMww.bat
- <Current directory>\NYkc.ico
- %TEMP%\VcgMoQoU.bat
- %TEMP%\WqAokcMo.bat
- C:\RCX9.tmp
- <Current directory>\koQy.exe
- <Current directory>\JAce.exe
- C:\RCX8.tmp
- <Current directory>\kigs.ico
- %TEMP%\TsYkIYUE.bat
- <Current directory>\jSUo.ico
- <Current directory>\iMwm.exe
- C:\RCXA.tmp
- %TEMP%\mckQIwcY.bat
- <Current directory>\EsAM.ico
- <Current directory>\PswS.exe
- <Current directory>\vmQw.ico
- <Current directory>\GwEM.ico
- <Current directory>\nwYw.exe
- C:\RCX6.tmp
- C:\RCX5.tmp
- %TEMP%\xYkoUIoA.bat
- <Current directory>\lyoI.ico
- <Current directory>\aUou.exe
- %TEMP%\jcAAAYIc.bat
- C:\RCX7.tmp
- %TEMP%\NissssMM.bat
- <Current directory>\AQoG.exe
- %TEMP%\TQAsYMko.bat
- %TEMP%\UcIoYYAw.bat
- <Current directory>\bIsY.ico
- %ALLUSERSPROFILE%\lwQggIEM\nwAEcgMA.exe
- %ALLUSERSPROFILE%\BWogoUMg\aeEkEEcE.exe
- %HOMEPATH%\fCkYUMIQ\pUccUkoM.exe
- <Current directory>\RcUE.exe
- <Current directory>\VMIs.ico
- <Current directory>\CqoI.ico
- %TEMP%\nsEgQosg.bat
- <Current directory>\OKMY.ico
- <Current directory>\MAso.exe
- <Current directory>\PsMU.exe
- %TEMP%\mEAgkQQw.bat
- <Current directory>\ZIsE.ico
- %TEMP%\LQIIQocc.bat
- %TEMP%\YQIUEggI.bat
- <Current directory>\wgQq.exe
- %TEMP%\hwcQYMcY.bat
- <Current directory>\IAQO.exe
- <Current directory>\ecoO.exe
- <Current directory>\XGMU.ico
- <Current directory>\SCkg.ico
- <Current directory>\ieco.ico
- <Current directory>\NkQK.exe
- %TEMP%\jisAEgkM.bat
- <Current directory>\qEUM.exe
- <Current directory>\Mcge.exe
- <Current directory>\okcA.ico
- <Current directory>\VUAc.ico
- %TEMP%\oGAQMIgw.bat
- <Current directory>\hOMQ.ico
- <Current directory>\kgUY.exe
- %TEMP%\OsQkMQUs.bat
- <Current directory>\HcEQ.exe
- <Current directory>\QskE.exe
- <Current directory>\ACEM.ico
- <Current directory>\XiIQ.ico
- %TEMP%\mWAEIsIw.bat
- <Current directory>\rEQc.exe
- <Current directory>\quok.ico
- <Current directory>\WCEw.ico
- %TEMP%\KicIgosw.bat
- %TEMP%\xYkoUIoA.bat
- <Current directory>\aUou.exe
- <Current directory>\tUgw.exe
- <Current directory>\Pysw.ico
- %TEMP%\CuYQMMww.bat
- %TEMP%\KUgoMwUk.bat
- %TEMP%\tWwEIQEA.bat
- %TEMP%\dugMgYsQ.bat
- %TEMP%\PIIMUQco.bat
- <Current directory>\PwIS.exe
- <Current directory>\rQEY.exe
- <Current directory>\NYkc.ico
- <Current directory>\lyoI.ico
- <Current directory>\kigs.ico
- <Current directory>\PswS.exe
- %TEMP%\VcgMoQoU.bat
- <Current directory>\koQy.exe
- <Current directory>\iMwm.exe
- <Current directory>\jSUo.ico
- <Current directory>\EsAM.ico
- %TEMP%\TsYkIYUE.bat
- <Current directory>\GwEM.ico
- <Current directory>\AQoG.exe
- %TEMP%\TQAsYMko.bat
- <Current directory>\nwYw.exe
- <Current directory>\JAce.exe
- <Current directory>\vmQw.ico
- <Current directory>\bIsY.ico
- %TEMP%\NissssMM.bat
- from C:\RCX10.tmp to <Current directory>\PsMU.exe
- from C:\RCX11.tmp to <Current directory>\MAso.exe
- from C:\RCXF.tmp to <Current directory>\RcUE.exe
- from C:\RCXD.tmp to <Current directory>\ecoO.exe
- from C:\RCXE.tmp to <Current directory>\IAQO.exe
- from C:\RCX12.tmp to <Current directory>\HcEQ.exe
- from C:\RCX16.tmp to <Current directory>\NkQK.exe
- from C:\RCX17.tmp to <Current directory>\Mcge.exe
- from C:\RCX15.tmp to <Current directory>\qEUM.exe
- from C:\RCX13.tmp to <Current directory>\kgUY.exe
- from C:\RCX14.tmp to <Current directory>\QskE.exe
- from C:\RCXC.tmp to <Current directory>\wgQq.exe
- from C:\RCX4.tmp to <Current directory>\tUgw.exe
- from C:\RCX5.tmp to <Current directory>\aUou.exe
- from C:\RCX3.tmp to <Current directory>\rEQc.exe
- from C:\RCX1.tmp to <Current directory>\rQEY.exe
- from C:\RCX2.tmp to <Current directory>\PwIS.exe
- from C:\RCX6.tmp to <Current directory>\nwYw.exe
- from C:\RCXA.tmp to <Current directory>\PswS.exe
- from C:\RCXB.tmp to <Current directory>\iMwm.exe
- from C:\RCX9.tmp to <Current directory>\koQy.exe
- from C:\RCX7.tmp to <Current directory>\AQoG.exe
- from C:\RCX8.tmp to <Current directory>\JAce.exe
- '19#.#86.45.170':9999
- '74.##5.232.51':80
- '20#.#7.164.69':9999
- '20#.#19.204.12':9999
- 74.##5.232.51/
- DNS ASK google.com
- ClassName: '' WindowName: 'pUccUkoM.exe'
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'Indicator' WindowName: ''
- ClassName: '' WindowName: 'aeEkEEcE.exe'