Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Shell' = 'explorer.exe, maxkiller.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Runonce' = '%WINDIR%\okmysadheok.exe'
Creates or modifies the following files:
- %HOMEPATH%\Start Menu\Programs\Startup\201092978868.exe
- %HOMEPATH%\Start Menu\Programs\Startup\mmsn.exe
- %HOMEPATH%\Start Menu\Programs\Startup\201092978867.exe
- %HOMEPATH%\Start Menu\Programs\Startup\201092978865.exe
- %HOMEPATH%\Start Menu\Programs\Startup\201092978866.exe
Creates the following files on removable media:
- <Drive name for removable media>:\New Folder (2).exe
- <Drive name for removable media>:\New Folder.exe
- <Drive name for removable media>:\autorun.inf
- <Drive name for removable media>:\okmysadheok.exe
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
- hidden files
Creates and executes the following:
- %HOMEPATH%\Start Menu\Programs\Startup\201092978866.exe
- %HOMEPATH%\Start Menu\Programs\Startup\201092978865.exe
Modifies file system :
Creates the following files:
- %WINDIR%\YahooMessenger.exe
- %TEMP%\aut7.tmp
- %TEMP%\qgxaqga
- %WINDIR%\maxkiller.exe
- %TEMP%\pytfxjf
- C:\New Folder (2).exe
- C:\New Folder.exe
- C:\autorun.inf
- C:\okmysadheok.exe
- %TEMP%\aut2.tmp
- %TEMP%\aut3.tmp
- %TEMP%\aut1.tmp
- %TEMP%\isagrdj
- %TEMP%\aut4.tmp
- %WINDIR%\okmysadheok.exe
- %TEMP%\aut6.tmp
- %TEMP%\aut5.tmp
- %WINDIR%\autorun.inf
Sets the 'hidden' attribute to the following files:
- C:\okmysadheok.exe
- <Drive name for removable media>:\autorun.inf
- <Drive name for removable media>:\okmysadheok.exe
- C:\autorun.inf
- %WINDIR%\maxkiller.exe
- %WINDIR%\okmysadheok.exe
- %WINDIR%\autorun.inf
Deletes the following files:
- %TEMP%\aut6.tmp
- %TEMP%\aut5.tmp
- %TEMP%\qgxaqga
- %TEMP%\pytfxjf
- %TEMP%\aut7.tmp
- %TEMP%\isagrdj
- %TEMP%\aut1.tmp
- %TEMP%\aut2.tmp
- %TEMP%\aut4.tmp
- %TEMP%\aut3.tmp
Miscellaneous:
Searches for the following windows:
- ClassName: 'Indicator' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''