Technical Information
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'aeEkEEcE.exe' = '%ALLUSERSPROFILE%\BWogoUMg\aeEkEEcE.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'pUccUkoM.exe' = '%HOMEPATH%\fCkYUMIQ\pUccUkoM.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\FkYQcQph] 'Start' = '00000002'
- hidden files
- file extensions
- User Account Control (UAC)
- '%ALLUSERSPROFILE%\lwQggIEM\nwAEcgMA.exe'
- '%ALLUSERSPROFILE%\BWogoUMg\aeEkEEcE.exe'
- '%HOMEPATH%\fCkYUMIQ\pUccUkoM.exe'
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\vskwgsoA.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\JgUoIcAg.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\OGUAQwUI.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\IGEUsIMQ.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\jCsYkAsw.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\GmcksYEo.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\BaMkAEgc.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\nYckYUUw.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\YyIscEEw.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\yMEsgocw.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\WUwQwEEU.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\GswUYcws.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\XesMwEMU.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\rUoowUQA.bat" "<Full path to virus>""
- '<SYSTEM32>\cscript.exe' %TEMP%\file.vbs
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\LqsYswYw.bat" "<Full path to virus>""
- '<SYSTEM32>\reg.exe' add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
- '<SYSTEM32>\reg.exe' add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
- '<SYSTEM32>\reg.exe' add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\hoQssIAM.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\USQIIkwo.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\rqIMoYcg.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\DEMYQscE.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\hYYoEggg.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\Cooowscc.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\bEIMssMw.bat" "<Full path to virus>""
- <Current directory>\NEMo.ico
- <Current directory>\ykAo.exe
- C:\RCXE.tmp
- %TEMP%\fGssMYoA.bat
- <Current directory>\EUUU.exe
- C:\RCXD.tmp
- %TEMP%\OGUAQwUI.bat
- %TEMP%\BaMkAEgc.bat
- <Current directory>\SUog.ico
- <Current directory>\qgQi.exe
- C:\RCXF.tmp
- <Current directory>\juoI.ico
- <Current directory>\sAwE.exe
- %TEMP%\iCwwAQAE.bat
- <Current directory>\oowS.exe
- C:\RCXB.tmp
- %TEMP%\vskwgsoA.bat
- <Current directory>\SIgU.ico
- C:\RCXA.tmp
- %TEMP%\GmcksYEo.bat
- %TEMP%\lwAwIEYg.bat
- %TEMP%\TEcQsAYo.bat
- %TEMP%\JgUoIcAg.bat
- <Current directory>\EOAc.ico
- C:\RCXC.tmp
- %TEMP%\ZIcIcYMc.bat
- <Current directory>\sSIg.ico
- <Current directory>\rsAG.exe
- <Current directory>\dicY.ico
- <Current directory>\nMcQ.exe
- C:\RCX14.tmp
- C:\RCX13.tmp
- <Current directory>\mGYM.ico
- %TEMP%\yGoEQogY.bat
- <Current directory>\GQIe.exe
- %TEMP%\yMEsgocw.bat
- %TEMP%\HsEwwcYU.bat
- C:\RCX15.tmp
- <Current directory>\Mscy.exe
- %TEMP%\aQAUUAMg.bat
- %TEMP%\YyIscEEw.bat
- <Current directory>\lQkQ.ico
- %TEMP%\WEckckIU.bat
- <Current directory>\SeIM.ico
- <Current directory>\XkAk.exe
- %TEMP%\GswUYcws.bat
- C:\RCX10.tmp
- %TEMP%\cmYsYEcU.bat
- %TEMP%\WUwQwEEU.bat
- C:\RCX12.tmp
- %TEMP%\XesMwEMU.bat
- %TEMP%\nYckYUUw.bat
- <Current directory>\iUQW.exe
- C:\RCX11.tmp
- %TEMP%\OSEIoQsA.bat
- <Current directory>\ZYQk.ico
- <Current directory>\yMsQ.exe
- %TEMP%\auwQgoQI.bat
- %TEMP%\hoQssIAM.bat
- <Current directory>\FwMQ.ico
- C:\RCX3.tmp
- <Current directory>\BiEk.ico
- <Current directory>\BEkI.exe
- %TEMP%\LqsYswYw.bat
- <Current directory>\okoU.exe
- %TEMP%\hYYoEggg.bat
- C:\RCX5.tmp
- <Current directory>\BGIY.ico
- <Current directory>\YcYY.exe
- C:\RCX4.tmp
- %TEMP%\nAsEYMgE.bat
- <Current directory>\SGYc.ico
- %TEMP%\rUoowUQA.bat
- <Current directory>\bAQg.exe
- <Current directory>\<Virus name>
- %ALLUSERSPROFILE%\lwQggIEM\nwAEcgMA.exe
- %TEMP%\IycAQoIk.bat
- %TEMP%\IaAgcQUc.bat
- <Current directory>\VUwg.exe
- C:\RCX2.tmp
- <Current directory>\yCcs.ico
- C:\RCX1.tmp
- %TEMP%\file.vbs
- %ALLUSERSPROFILE%\casg.txt
- %TEMP%\DEMYQscE.bat
- %TEMP%\eicUEgcg.bat
- <Current directory>\gEsk.ico
- C:\RCX8.tmp
- <Current directory>\Booe.exe
- %TEMP%\qIswwAwQ.bat
- %TEMP%\rqIMoYcg.bat
- %TEMP%\jCsYkAsw.bat
- %TEMP%\HasIQMUU.bat
- <Current directory>\FCsY.ico
- C:\RCX9.tmp
- <Current directory>\GoQg.exe
- %TEMP%\IGEUsIMQ.bat
- %TEMP%\jsEMEYoQ.bat
- C:\RCX6.tmp
- %TEMP%\NacwoMcQ.bat
- %TEMP%\bEIMssMw.bat
- <Current directory>\ogsQ.exe
- %TEMP%\xWswkoEo.bat
- %TEMP%\Cooowscc.bat
- <Current directory>\XscE.ico
- %TEMP%\USQIIkwo.bat
- %TEMP%\MwwEUQkg.bat
- <Current directory>\liAA.ico
- C:\RCX7.tmp
- %TEMP%\XIgsUYcE.bat
- <Current directory>\FQwk.ico
- <Current directory>\lYEy.exe
- %ALLUSERSPROFILE%\lwQggIEM\nwAEcgMA.exe
- %ALLUSERSPROFILE%\BWogoUMg\aeEkEEcE.exe
- %HOMEPATH%\fCkYUMIQ\pUccUkoM.exe
- <Current directory>\ykAo.exe
- %TEMP%\fGssMYoA.bat
- <Current directory>\EOAc.ico
- <Current directory>\NEMo.ico
- <Current directory>\juoI.ico
- <Current directory>\sAwE.exe
- %TEMP%\iCwwAQAE.bat
- <Current directory>\EUUU.exe
- <Current directory>\SIgU.ico
- <Current directory>\oowS.exe
- %TEMP%\lwAwIEYg.bat
- %TEMP%\ZIcIcYMc.bat
- %TEMP%\TEcQsAYo.bat
- <Current directory>\sSIg.ico
- <Current directory>\rsAG.exe
- %TEMP%\cmYsYEcU.bat
- <Current directory>\mGYM.ico
- <Current directory>\GQIe.exe
- %TEMP%\yGoEQogY.bat
- %TEMP%\aQAUUAMg.bat
- %TEMP%\HsEwwcYU.bat
- <Current directory>\dicY.ico
- <Current directory>\nMcQ.exe
- <Current directory>\ZYQk.ico
- %TEMP%\WEckckIU.bat
- <Current directory>\SUog.ico
- <Current directory>\qgQi.exe
- <Current directory>\XkAk.exe
- <Current directory>\iUQW.exe
- %TEMP%\OSEIoQsA.bat
- <Current directory>\SeIM.ico
- <Current directory>\FCsY.ico
- <Current directory>\YcYY.exe
- %TEMP%\nAsEYMgE.bat
- <Current directory>\BiEk.ico
- <Current directory>\FwMQ.ico
- <Current directory>\BGIY.ico
- <Current directory>\okoU.exe
- %TEMP%\xWswkoEo.bat
- <Current directory>\BEkI.exe
- <Current directory>\SGYc.ico
- <Current directory>\bAQg.exe
- %TEMP%\IycAQoIk.bat
- %TEMP%\IaAgcQUc.bat
- %TEMP%\auwQgoQI.bat
- <Current directory>\yCcs.ico
- <Current directory>\VUwg.exe
- %TEMP%\NacwoMcQ.bat
- %TEMP%\jsEMEYoQ.bat
- <Current directory>\liAA.ico
- %TEMP%\eicUEgcg.bat
- <Current directory>\GoQg.exe
- <Current directory>\yMsQ.exe
- %TEMP%\HasIQMUU.bat
- <Current directory>\gEsk.ico
- <Current directory>\Booe.exe
- %TEMP%\XIgsUYcE.bat
- <Current directory>\XscE.ico
- <Current directory>\ogsQ.exe
- <Current directory>\lYEy.exe
- %TEMP%\qIswwAwQ.bat
- <Current directory>\FQwk.ico
- %TEMP%\MwwEUQkg.bat
- from C:\RCXE.tmp to <Current directory>\ykAo.exe
- from C:\RCXF.tmp to <Current directory>\sAwE.exe
- from C:\RCXD.tmp to <Current directory>\EUUU.exe
- from C:\RCXB.tmp to <Current directory>\oowS.exe
- from C:\RCXC.tmp to <Current directory>\rsAG.exe
- from C:\RCX13.tmp to <Current directory>\GQIe.exe
- from C:\RCX14.tmp to <Current directory>\nMcQ.exe
- from C:\RCX12.tmp to <Current directory>\iUQW.exe
- from C:\RCX10.tmp to <Current directory>\qgQi.exe
- from C:\RCX11.tmp to <Current directory>\XkAk.exe
- from C:\RCX4.tmp to <Current directory>\YcYY.exe
- from C:\RCX5.tmp to <Current directory>\okoU.exe
- from C:\RCX3.tmp to <Current directory>\BEkI.exe
- from C:\RCX1.tmp to <Current directory>\bAQg.exe
- from C:\RCX2.tmp to <Current directory>\VUwg.exe
- from C:\RCX9.tmp to <Current directory>\GoQg.exe
- from C:\RCXA.tmp to <Current directory>\yMsQ.exe
- from C:\RCX8.tmp to <Current directory>\Booe.exe
- from C:\RCX6.tmp to <Current directory>\ogsQ.exe
- from C:\RCX7.tmp to <Current directory>\lYEy.exe
- '19#.#86.45.170':9999
- '20#.#19.204.12':9999
- '20#.#7.164.69':9999
- DNS ASK google.com
- ClassName: '' WindowName: 'pUccUkoM.exe'
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'Indicator' WindowName: ''
- ClassName: '' WindowName: 'aeEkEEcE.exe'