Technical Information
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'aeEkEEcE.exe' = '%ALLUSERSPROFILE%\BWogoUMg\aeEkEEcE.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'pUccUkoM.exe' = '%HOMEPATH%\fCkYUMIQ\pUccUkoM.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\FkYQcQph] 'Start' = '00000002'
- hidden files
- file extensions
- User Account Control (UAC)
- '%ALLUSERSPROFILE%\lwQggIEM\nwAEcgMA.exe'
- '%ALLUSERSPROFILE%\BWogoUMg\aeEkEEcE.exe'
- '%HOMEPATH%\fCkYUMIQ\pUccUkoM.exe'
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\NswMEoYc.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\jwYkcMQk.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\LaQMkskE.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\QWIEYQsM.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\PaQEwEIU.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\lSIYgscY.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\EmkgkIkM.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\PmAUsoQM.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\WuAAMkss.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\wWQkgIYg.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\xAsYMAoA.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\ZokMUUsE.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\ryEwkUgY.bat" "<Full path to virus>""
- '<SYSTEM32>\cscript.exe' %TEMP%\file.vbs
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\eMsgkMkk.bat" "<Full path to virus>""
- '<SYSTEM32>\reg.exe' add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
- '<SYSTEM32>\reg.exe' add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
- '<SYSTEM32>\reg.exe' add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\HcggUwUc.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\HUIgYkQE.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\rEosQEUU.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\FKwoQEco.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\OOUYMswM.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\woUYYkUg.bat" "<Full path to virus>""
- C:\RCXE.tmp
- %TEMP%\IYwUYgks.bat
- <Current directory>\WQgc.ico
- %TEMP%\lSIYgscY.bat
- <Current directory>\VIUQ.ico
- <Current directory>\Fswa.exe
- <Current directory>\LQUG.exe
- %TEMP%\jwYkcMQk.bat
- <Current directory>\MOIY.ico
- <Current directory>\FgoE.exe
- C:\RCXF.tmp
- %TEMP%\NswMEoYc.bat
- %TEMP%\FEEQcQUk.bat
- C:\RCXB.tmp
- %TEMP%\mWQsIwss.bat
- <Current directory>\zygg.ico
- %TEMP%\QWIEYQsM.bat
- <Current directory>\dMsA.ico
- <Current directory>\HQII.exe
- <Current directory>\nQEW.exe
- <Current directory>\KIgC.exe
- C:\RCXD.tmp
- %TEMP%\FeUckYAk.bat
- C:\RCXC.tmp
- %TEMP%\PaQEwEIU.bat
- <Current directory>\eaIU.ico
- %TEMP%\GQAEAgYQ.bat
- %TEMP%\EmkgkIkM.bat
- %TEMP%\PmAUsoQM.bat
- C:\RCX12.tmp
- %TEMP%\EywkQsUg.bat
- %TEMP%\ZokMUUsE.bat
- %TEMP%\aKQoQUUI.bat
- %TEMP%\WuAAMkss.bat
- %TEMP%\QCoocsEY.bat
- %TEMP%\xWggYMEQ.bat
- <Current directory>\CCUg.ico
- <Current directory>\NYgk.exe
- C:\RCX13.tmp
- %TEMP%\vgoEYYsM.bat
- <Current directory>\dqck.ico
- <Current directory>\NIQM.exe
- %TEMP%\cyMMYMUU.bat
- C:\RCX10.tmp
- %TEMP%\LaQMkskE.bat
- %TEMP%\wWQkgIYg.bat
- <Current directory>\ykcw.ico
- %TEMP%\CswEcUoE.bat
- <Current directory>\rIAW.exe
- C:\RCX11.tmp
- %TEMP%\QgYwAYUY.bat
- %TEMP%\xAsYMAoA.bat
- <Current directory>\xAIE.exe
- C:\RCX2.tmp
- %TEMP%\OOUYMswM.bat
- %ALLUSERSPROFILE%\casg.txt
- <Current directory>\lKAc.ico
- %TEMP%\LIgEskAU.bat
- <Current directory>\juMA.ico
- <Current directory>\cKQg.ico
- <Current directory>\xEIM.exe
- %TEMP%\woUYYkUg.bat
- <Current directory>\dEsa.exe
- C:\RCX3.tmp
- %TEMP%\kwcoosUE.bat
- <Current directory>\<Virus name>
- %TEMP%\ryEwkUgY.bat
- %TEMP%\yKowgkUc.bat
- %ALLUSERSPROFILE%\lwQggIEM\nwAEcgMA.exe
- %TEMP%\lyogMAgU.bat
- %TEMP%\file.vbs
- <Current directory>\kgoE.exe
- C:\RCX1.tmp
- %TEMP%\FKwoQEco.bat
- %TEMP%\eMsgkMkk.bat
- <Current directory>\SQsg.ico
- %TEMP%\HgEkckgM.bat
- %TEMP%\HUIgYkQE.bat
- %TEMP%\EmMIUcIk.bat
- <Current directory>\rckY.ico
- <Current directory>\NMkU.ico
- <Current directory>\Rcow.exe
- C:\RCX8.tmp
- <Current directory>\qoUi.exe
- <Current directory>\SMEo.ico
- <Current directory>\rQAg.exe
- C:\RCXA.tmp
- C:\RCX9.tmp
- %TEMP%\rEosQEUU.bat
- %TEMP%\WOIgAQss.bat
- <Current directory>\HQYw.exe
- C:\RCX5.tmp
- %TEMP%\HcggUwUc.bat
- C:\RCX4.tmp
- <Current directory>\kMoM.ico
- %TEMP%\dIcgYkEs.bat
- <Current directory>\DcwQ.ico
- <Current directory>\TUwE.ico
- <Current directory>\SUwA.exe
- C:\RCX7.tmp
- <Current directory>\sMAk.exe
- C:\RCX6.tmp
- %TEMP%\JyEwAYAM.bat
- %ALLUSERSPROFILE%\lwQggIEM\nwAEcgMA.exe
- %ALLUSERSPROFILE%\BWogoUMg\aeEkEEcE.exe
- %HOMEPATH%\fCkYUMIQ\pUccUkoM.exe
- <Current directory>\VIUQ.ico
- <Current directory>\Fswa.exe
- <Current directory>\eaIU.ico
- %TEMP%\IYwUYgks.bat
- <Current directory>\WQgc.ico
- %TEMP%\FEEQcQUk.bat
- <Current directory>\LQUG.exe
- %TEMP%\mWQsIwss.bat
- <Current directory>\dMsA.ico
- <Current directory>\HQII.exe
- <Current directory>\nQEW.exe
- <Current directory>\KIgC.exe
- %TEMP%\FeUckYAk.bat
- <Current directory>\zygg.ico
- %TEMP%\GQAEAgYQ.bat
- %TEMP%\EywkQsUg.bat
- %TEMP%\CswEcUoE.bat
- <Current directory>\rIAW.exe
- %TEMP%\QCoocsEY.bat
- %TEMP%\aKQoQUUI.bat
- <Current directory>\ykcw.ico
- %TEMP%\vgoEYYsM.bat
- <Current directory>\FgoE.exe
- %TEMP%\cyMMYMUU.bat
- <Current directory>\MOIY.ico
- <Current directory>\dqck.ico
- <Current directory>\NIQM.exe
- %TEMP%\QgYwAYUY.bat
- <Current directory>\SMEo.ico
- <Current directory>\dEsa.exe
- %TEMP%\kwcoosUE.bat
- <Current directory>\lKAc.ico
- <Current directory>\juMA.ico
- %TEMP%\dIcgYkEs.bat
- <Current directory>\cKQg.ico
- <Current directory>\xEIM.exe
- %TEMP%\HgEkckgM.bat
- %TEMP%\yKowgkUc.bat
- %TEMP%\lyogMAgU.bat
- <Current directory>\kgoE.exe
- <Current directory>\xAIE.exe
- %TEMP%\LIgEskAU.bat
- <Current directory>\SQsg.ico
- %TEMP%\EmMIUcIk.bat
- <Current directory>\NMkU.ico
- <Current directory>\Rcow.exe
- <Current directory>\qoUi.exe
- <Current directory>\rQAg.exe
- %TEMP%\WOIgAQss.bat
- <Current directory>\rckY.ico
- <Current directory>\sMAk.exe
- <Current directory>\kMoM.ico
- <Current directory>\HQYw.exe
- <Current directory>\DcwQ.ico
- <Current directory>\TUwE.ico
- <Current directory>\SUwA.exe
- %TEMP%\JyEwAYAM.bat
- from C:\RCXC.tmp to <Current directory>\nQEW.exe
- from C:\RCXD.tmp to <Current directory>\KIgC.exe
- from C:\RCXA.tmp to <Current directory>\rQAg.exe
- from C:\RCXB.tmp to <Current directory>\HQII.exe
- from C:\RCXE.tmp to <Current directory>\Fswa.exe
- from C:\RCX11.tmp to <Current directory>\NIQM.exe
- from C:\RCX12.tmp to <Current directory>\rIAW.exe
- from C:\RCXF.tmp to <Current directory>\LQUG.exe
- from C:\RCX10.tmp to <Current directory>\FgoE.exe
- from C:\RCX3.tmp to <Current directory>\dEsa.exe
- from C:\RCX4.tmp to <Current directory>\xEIM.exe
- from C:\RCX1.tmp to <Current directory>\kgoE.exe
- from C:\RCX2.tmp to <Current directory>\xAIE.exe
- from C:\RCX5.tmp to <Current directory>\HQYw.exe
- from C:\RCX8.tmp to <Current directory>\Rcow.exe
- from C:\RCX9.tmp to <Current directory>\qoUi.exe
- from C:\RCX6.tmp to <Current directory>\sMAk.exe
- from C:\RCX7.tmp to <Current directory>\SUwA.exe
- '19#.#86.45.170':9999
- '74.##5.232.51':80
- '20#.#7.164.69':9999
- '20#.#19.204.12':9999
- 74.##5.232.51/
- DNS ASK google.com
- ClassName: '' WindowName: 'aeEkEEcE.exe'
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'Indicator' WindowName: ''
- ClassName: '' WindowName: 'pUccUkoM.exe'