Technical Information
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'aeEkEEcE.exe' = '%ALLUSERSPROFILE%\BWogoUMg\aeEkEEcE.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'pUccUkoM.exe' = '%HOMEPATH%\fCkYUMIQ\pUccUkoM.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\FkYQcQph] 'Start' = '00000002'
- hidden files
- file extensions
- User Account Control (UAC)
- '%ALLUSERSPROFILE%\lwQggIEM\nwAEcgMA.exe'
- '%ALLUSERSPROFILE%\BWogoUMg\aeEkEEcE.exe'
- '%HOMEPATH%\fCkYUMIQ\pUccUkoM.exe'
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\ZGswcoIk.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\HAAMcwEo.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\FWgYwQcg.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\FKwkEEgM.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\iQYgoQgQ.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\kmkIsQYo.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\RoMMYskU.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\CsQgkUoU.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\iWIoIIss.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\cIgokYII.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\DwgsoIkg.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\KWIQIcYk.bat" "<Full path to virus>""
- '<SYSTEM32>\wbem\wmiadap.exe' /R /T
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\FEIQUIII.bat" "<Full path to virus>""
- '<SYSTEM32>\cscript.exe' %TEMP%\file.vbs
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\niwMMwUg.bat" "<Full path to virus>""
- '<SYSTEM32>\reg.exe' add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
- '<SYSTEM32>\reg.exe' add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
- '<SYSTEM32>\reg.exe' add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\UecQgAEM.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\tosAUcQY.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\ISAEsEcI.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\xWoMAccA.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\YEMMsYIo.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\bwEQYgMY.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\GEkUMgIw.bat" "<Full path to virus>""
- %TEMP%\pOgkQwUQ.bat
- <Current directory>\pOgU.ico
- <Current directory>\CgQo.exe
- C:\RCX10.tmp
- <Current directory>\OIMo.ico
- <Current directory>\VUEE.exe
- %TEMP%\HAAMcwEo.bat
- C:\RCX11.tmp
- %TEMP%\vioMIIMo.bat
- <Current directory>\VMQw.ico
- <Current directory>\gMgo.exe
- %TEMP%\FWgYwQcg.bat
- <Current directory>\MOkc.ico
- <Current directory>\FkkI.exe
- C:\RCX12.tmp
- %TEMP%\kmkIsQYo.bat
- C:\RCXD.tmp
- %TEMP%\zecEoEQE.bat
- <Current directory>\kwQu.exe
- %TEMP%\iQYgoQgQ.bat
- %TEMP%\jkgcsAok.bat
- <Current directory>\FakU.ico
- <Current directory>\IuEI.ico
- <Current directory>\tkgw.ico
- <Current directory>\RooU.exe
- C:\RCXF.tmp
- %TEMP%\dEkYYAMI.bat
- <Current directory>\pwku.exe
- %TEMP%\ZGswcoIk.bat
- C:\RCXE.tmp
- C:\RCX13.tmp
- %TEMP%\CsQgkUoU.bat
- <Current directory>\rMsU.ico
- <Current directory>\WYwU.exe
- %TEMP%\yMoQkwkY.bat
- <Current directory>\NwsS.exe
- C:\RCX17.tmp
- %TEMP%\HKsYQQgw.bat
- C:\RCX18.tmp
- <Current directory>\fSAY.ico
- <Current directory>\zowK.exe
- C:\RCX19.tmp
- %TEMP%\qCMQcwsw.bat
- %TEMP%\iWIoIIss.bat
- %TEMP%\CQUQwgYo.bat
- %TEMP%\cIgokYII.bat
- <Current directory>\cAUc.ico
- <Current directory>\Fowu.exe
- %TEMP%\QiUscwkY.bat
- C:\RCX14.tmp
- <Current directory>\EyYM.ico
- <Current directory>\UYIg.exe
- %TEMP%\RoMMYskU.bat
- C:\RCX15.tmp
- %TEMP%\rUgYgosw.bat
- %TEMP%\KWIQIcYk.bat
- <Current directory>\NeAw.ico
- C:\RCX16.tmp
- %TEMP%\DwgsoIkg.bat
- <Current directory>\dQgE.ico
- <Current directory>\cMsG.exe
- C:\RCXC.tmp
- <Current directory>\QMEk.exe
- C:\RCX3.tmp
- <Current directory>\lywE.ico
- <Current directory>\amgs.ico
- <Current directory>\UYgG.exe
- C:\RCX2.tmp
- %TEMP%\uEowwwcc.bat
- <Current directory>\QAEK.exe
- C:\RCX5.tmp
- %TEMP%\hUYsUgso.bat
- %TEMP%\bwEQYgMY.bat
- <Current directory>\zMgK.exe
- C:\RCX4.tmp
- %TEMP%\YEMMsYIo.bat
- <Current directory>\AKkg.ico
- %TEMP%\FEIQUIII.bat
- <Current directory>\rkks.ico
- %TEMP%\file.vbs
- <Current directory>\<Virus name>
- %ALLUSERSPROFILE%\lwQggIEM\nwAEcgMA.exe
- %TEMP%\juIkAwAg.bat
- %TEMP%\LMIYQoMg.bat
- %TEMP%\XMcUkcQM.bat
- <Current directory>\BIEQ.ico
- %TEMP%\UecQgAEM.bat
- %ALLUSERSPROFILE%\casg.txt
- <Current directory>\acYa.exe
- C:\RCX1.tmp
- %TEMP%\niwMMwUg.bat
- %TEMP%\vgwUMUEU.bat
- C:\RCX9.tmp
- <Current directory>\imQA.ico
- <Current directory>\ZogS.exe
- <Current directory>\AcAu.exe
- %TEMP%\xAkAYUQs.bat
- %TEMP%\xWoMAccA.bat
- <Current directory>\QOIQ.ico
- C:\RCXA.tmp
- C:\RCXB.tmp
- <Current directory>\BkAw.ico
- <Current directory>\esco.exe
- <Current directory>\XIcc.exe
- %TEMP%\FKwkEEgM.bat
- %TEMP%\GwEIsAIc.bat
- <Current directory>\hsAw.ico
- C:\RCX6.tmp
- %TEMP%\tosAUcQY.bat
- %TEMP%\FwYUsYkI.bat
- <Current directory>\XIwY.exe
- %TEMP%\GEkUMgIw.bat
- %TEMP%\tksMEcIc.bat
- <Current directory>\liIo.ico
- %TEMP%\pgcIMQMY.bat
- <Current directory>\KEgI.ico
- <Current directory>\LEoC.exe
- C:\RCX8.tmp
- C:\RCX7.tmp
- <Current directory>\RQoI.ico
- %TEMP%\ISAEsEcI.bat
- <Current directory>\MQYw.exe
- %ALLUSERSPROFILE%\lwQggIEM\nwAEcgMA.exe
- %ALLUSERSPROFILE%\BWogoUMg\aeEkEEcE.exe
- %HOMEPATH%\fCkYUMIQ\pUccUkoM.exe
- %TEMP%\pOgkQwUQ.bat
- <Current directory>\CgQo.exe
- <Current directory>\VUEE.exe
- <Current directory>\OIMo.ico
- <Current directory>\MOkc.ico
- %TEMP%\vioMIIMo.bat
- <Current directory>\pOgU.ico
- <Current directory>\FkkI.exe
- <Current directory>\tkgw.ico
- <Current directory>\kwQu.exe
- <Current directory>\FakU.ico
- <Current directory>\BkAw.ico
- %TEMP%\zecEoEQE.bat
- %TEMP%\dEkYYAMI.bat
- <Current directory>\RooU.exe
- <Current directory>\pwku.exe
- <Current directory>\IuEI.ico
- <Current directory>\gMgo.exe
- <Current directory>\NeAw.ico
- %TEMP%\yMoQkwkY.bat
- %TEMP%\HKsYQQgw.bat
- <Current directory>\NwsS.exe
- <Current directory>\rMsU.ico
- %TEMP%\qCMQcwsw.bat
- %TEMP%\CQUQwgYo.bat
- <Current directory>\WYwU.exe
- <Current directory>\dQgE.ico
- <Current directory>\EyYM.ico
- %TEMP%\QiUscwkY.bat
- <Current directory>\VMQw.ico
- <Current directory>\UYIg.exe
- %TEMP%\rUgYgosw.bat
- <Current directory>\cMsG.exe
- <Current directory>\Fowu.exe
- <Current directory>\cAUc.ico
- <Current directory>\lywE.ico
- %TEMP%\hUYsUgso.bat
- <Current directory>\amgs.ico
- <Current directory>\QAEK.exe
- %TEMP%\tksMEcIc.bat
- <Current directory>\AKkg.ico
- %TEMP%\vgwUMUEU.bat
- <Current directory>\zMgK.exe
- <Current directory>\QMEk.exe
- <Current directory>\acYa.exe
- <Current directory>\rkks.ico
- %TEMP%\juIkAwAg.bat
- %TEMP%\LMIYQoMg.bat
- <Current directory>\BIEQ.ico
- %TEMP%\uEowwwcc.bat
- %TEMP%\XMcUkcQM.bat
- <Current directory>\UYgG.exe
- %TEMP%\FwYUsYkI.bat
- <Current directory>\imQA.ico
- %TEMP%\GwEIsAIc.bat
- <Current directory>\QOIQ.ico
- <Current directory>\ZogS.exe
- %TEMP%\jkgcsAok.bat
- <Current directory>\esco.exe
- <Current directory>\XIcc.exe
- <Current directory>\hsAw.ico
- <Current directory>\AcAu.exe
- %TEMP%\pgcIMQMY.bat
- <Current directory>\MQYw.exe
- <Current directory>\XIwY.exe
- <Current directory>\liIo.ico
- <Current directory>\KEgI.ico
- %TEMP%\xAkAYUQs.bat
- <Current directory>\RQoI.ico
- <Current directory>\LEoC.exe
- from C:\RCX10.tmp to <Current directory>\VUEE.exe
- from C:\RCX11.tmp to <Current directory>\CgQo.exe
- from C:\RCX12.tmp to <Current directory>\FkkI.exe
- from C:\RCXD.tmp to <Current directory>\kwQu.exe
- from C:\RCXE.tmp to <Current directory>\pwku.exe
- from C:\RCXF.tmp to <Current directory>\RooU.exe
- from C:\RCX16.tmp to <Current directory>\cMsG.exe
- from C:\RCX17.tmp to <Current directory>\NwsS.exe
- from C:\RCX18.tmp to <Current directory>\WYwU.exe
- from C:\RCX13.tmp to <Current directory>\gMgo.exe
- from C:\RCX14.tmp to <Current directory>\UYIg.exe
- from C:\RCX15.tmp to <Current directory>\Fowu.exe
- from C:\RCX4.tmp to <Current directory>\QAEK.exe
- from C:\RCX5.tmp to <Current directory>\zMgK.exe
- from C:\RCX6.tmp to <Current directory>\XIwY.exe
- from C:\RCX1.tmp to <Current directory>\acYa.exe
- from C:\RCX2.tmp to <Current directory>\UYgG.exe
- from C:\RCX3.tmp to <Current directory>\QMEk.exe
- from C:\RCXA.tmp to <Current directory>\ZogS.exe
- from C:\RCXB.tmp to <Current directory>\XIcc.exe
- from C:\RCXC.tmp to <Current directory>\esco.exe
- from C:\RCX7.tmp to <Current directory>\MQYw.exe
- from C:\RCX8.tmp to <Current directory>\LEoC.exe
- from C:\RCX9.tmp to <Current directory>\AcAu.exe
- '19#.#86.45.170':9999
- '74.##5.232.51':80
- '20#.#7.164.69':9999
- '20#.#19.204.12':9999
- 74.##5.232.51/
- DNS ASK google.com
- ClassName: '' WindowName: 'pUccUkoM.exe'
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'Indicator' WindowName: ''
- ClassName: '' WindowName: 'aeEkEEcE.exe'