Technical Information
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe,%ALLUSERSPROFILE%\vesswIQA\AcIcUcAM.exe,'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'AcIcUcAM.exe' = '%ALLUSERSPROFILE%\vesswIQA\AcIcUcAM.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'jaQEcQMQ.exe' = '%HOMEPATH%\NIMMEwsg\jaQEcQMQ.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\FkYQcQph] 'Start' = '00000002'
- hidden files
- file extensions
- User Account Control (UAC)
- '%ALLUSERSPROFILE%\lwQggIEM\nwAEcgMA.exe'
- '%ALLUSERSPROFILE%\vesswIQA\AcIcUcAM.exe'
- '%HOMEPATH%\NIMMEwsg\jaQEcQMQ.exe'
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\DEocAgQI.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\rSwgEcMw.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\WikUsgMk.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\LsYYkQAY.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\WusEoEEA.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\IqYoQgEk.bat" "<Full path to virus>""
- '<SYSTEM32>\reg.exe' add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
- '<SYSTEM32>\reg.exe' add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
- '<SYSTEM32>\reg.exe' add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\EosAwwgE.bat" "<Full path to virus>""
- '<SYSTEM32>\cscript.exe' %TEMP%\file.vbs
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\jUQQcUIA.bat" "<Full path to virus>""
- <SYSTEM32>\cmd.exe
- %TEMP%\rSwgEcMw.bat
- <Current directory>\jUsY.ico
- <Current directory>\cYIU.exe
- <Current directory>\mOkU.ico
- <Current directory>\bskS.exe
- C:\RCX12.tmp
- <Current directory>\tuYM.ico
- <Current directory>\IgAM.exe
- C:\RCX14.tmp
- C:\RCX13.tmp
- %TEMP%\NWAAIwcE.bat
- %TEMP%\DEocAgQI.bat
- C:\RCX11.tmp
- <Current directory>\howk.ico
- <Current directory>\rEQq.exe
- C:\RCXF.tmp
- <Current directory>\aScI.ico
- <Current directory>\zEAm.exe
- C:\RCXE.tmp
- %TEMP%\aQUIkcYY.bat
- <Current directory>\ukko.ico
- <Current directory>\sAIc.exe
- <Current directory>\sKwo.ico
- <Current directory>\moQm.exe
- C:\RCX10.tmp
- %TEMP%\rSkkwswc.bat
- C:\RCX18.tmp
- <Current directory>\Pecc.ico
- %TEMP%\WykwwgoY.bat
- %TEMP%\LsYYkQAY.bat
- <Current directory>\ZoMw.ico
- <Current directory>\oAkc.exe
- <Current directory>\LsYs.ico
- <Current directory>\QMYW.exe
- %TEMP%\~DFBD6E.tmp
- <Current directory>\bkAS.exe
- C:\RCX19.tmp
- %TEMP%\hkkYcMMg.bat
- C:\RCX17.tmp
- C:\RCX15.tmp
- %TEMP%\RUwwQskQ.bat
- <Current directory>\lYIU.ico
- <Current directory>\PIgg.ico
- %TEMP%\IqYoQgEk.bat
- <Current directory>\EYQM.exe
- <Current directory>\viAU.ico
- <Current directory>\YQEo.exe
- %TEMP%\KoQAAMkk.bat
- <Current directory>\YUUO.exe
- C:\RCX16.tmp
- %TEMP%\WusEoEEA.bat
- %TEMP%\WikUsgMk.bat
- <Current directory>\NUEu.exe
- C:\RCX3.tmp
- <Current directory>\FUgM.ico
- <Current directory>\oYsU.exe
- C:\RCX2.tmp
- <Current directory>\yUcg.ico
- <Current directory>\FMYg.exe
- C:\RCX5.tmp
- <Current directory>\tCQI.ico
- <Current directory>\csMq.exe
- C:\RCX4.tmp
- <Current directory>\TeYc.ico
- <Current directory>\vKwo.ico
- %ALLUSERSPROFILE%\casg.txt
- C:\Documents and Settings\LocalService\NIMMEwsg\jaQEcQMQ
- %TEMP%\dcIwMoss.bat
- %HOMEPATH%\NIMMEwsg\jaQEcQMQ
- %ALLUSERSPROFILE%\vesswIQA\AcIcUcAM
- %ALLUSERSPROFILE%\lwQggIEM\nwAEcgMA.exe
- C:\RCX1.tmp
- %TEMP%\jUQQcUIA.bat
- %TEMP%\file.vbs
- <Current directory>\<Virus name>
- <Current directory>\iSME.ico
- <Current directory>\lEMq.exe
- <Current directory>\kswm.exe
- <Current directory>\awkY.exe
- C:\RCXB.tmp
- %TEMP%\XogMsIos.bat
- <Current directory>\AsEC.exe
- C:\RCXA.tmp
- <Current directory>\rkoU.ico
- <Current directory>\zeAk.ico
- <Current directory>\oMAo.exe
- C:\RCXD.tmp
- <Current directory>\eikw.ico
- <Current directory>\PQoA.exe
- C:\RCXC.tmp
- <Current directory>\VMsE.ico
- <Current directory>\GwAI.exe
- C:\RCX7.tmp
- <Current directory>\lMoY.ico
- C:\RCX6.tmp
- %TEMP%\BQYgsUUI.bat
- <Current directory>\nucE.ico
- <Current directory>\IEQc.ico
- <Current directory>\TsMk.exe
- C:\RCX9.tmp
- <Current directory>\VMIG.exe
- C:\RCX8.tmp
- %TEMP%\EosAwwgE.bat
- %TEMP%\NWAAIwcE.bat
- <Current directory>\mOkU.ico
- <Current directory>\bskS.exe
- <Current directory>\cYIU.exe
- <Current directory>\IgAM.exe
- %TEMP%\rSkkwswc.bat
- <Current directory>\jUsY.ico
- <Current directory>\ukko.ico
- <Current directory>\howk.ico
- <Current directory>\rEQq.exe
- <Current directory>\aScI.ico
- <Current directory>\moQm.exe
- <Current directory>\sAIc.exe
- %TEMP%\aQUIkcYY.bat
- <Current directory>\sKwo.ico
- <Current directory>\ZoMw.ico
- <Current directory>\oAkc.exe
- <Current directory>\viAU.ico
- %TEMP%\WykwwgoY.bat
- <Current directory>\LsYs.ico
- <Current directory>\Pecc.ico
- <Current directory>\bkAS.exe
- <Current directory>\YQEo.exe
- %TEMP%\RUwwQskQ.bat
- <Current directory>\EYQM.exe
- <Current directory>\tuYM.ico
- <Current directory>\PIgg.ico
- %TEMP%\KoQAAMkk.bat
- <Current directory>\lYIU.ico
- <Current directory>\YUUO.exe
- <Current directory>\TeYc.ico
- <Current directory>\FMYg.exe
- <Current directory>\FUgM.ico
- <Current directory>\kswm.exe
- <Current directory>\GwAI.exe
- %TEMP%\BQYgsUUI.bat
- <Current directory>\tCQI.ico
- <Current directory>\csMq.exe
- <Current directory>\iSME.ico
- <Current directory>\lEMq.exe
- %TEMP%\dcIwMoss.bat
- <Current directory>\oYsU.exe
- <Current directory>\yUcg.ico
- <Current directory>\NUEu.exe
- <Current directory>\vKwo.ico
- <Current directory>\PQoA.exe
- %TEMP%\XogMsIos.bat
- <Current directory>\rkoU.ico
- <Current directory>\eikw.ico
- <Current directory>\zEAm.exe
- <Current directory>\zeAk.ico
- <Current directory>\oMAo.exe
- <Current directory>\awkY.exe
- <Current directory>\lMoY.ico
- <Current directory>\VMIG.exe
- <Current directory>\nucE.ico
- <Current directory>\TsMk.exe
- <Current directory>\VMsE.ico
- <Current directory>\AsEC.exe
- <Current directory>\IEQc.ico
- from C:\RCX11.tmp to <Current directory>\sAIc.exe
- from C:\RCX12.tmp to <Current directory>\bskS.exe
- from C:\RCX13.tmp to <Current directory>\cYIU.exe
- from C:\RCXE.tmp to <Current directory>\zEAm.exe
- from C:\RCXF.tmp to <Current directory>\rEQq.exe
- from C:\RCX10.tmp to <Current directory>\moQm.exe
- from C:\RCX17.tmp to <Current directory>\YQEo.exe
- from C:\RCX18.tmp to <Current directory>\oAkc.exe
- from C:\RCX19.tmp to <Current directory>\bkAS.exe
- from C:\RCX14.tmp to <Current directory>\IgAM.exe
- from C:\RCX15.tmp to <Current directory>\EYQM.exe
- from C:\RCX16.tmp to <Current directory>\YUUO.exe
- from C:\RCXD.tmp to <Current directory>\oMAo.exe
- from C:\RCX4.tmp to <Current directory>\csMq.exe
- from C:\RCX5.tmp to <Current directory>\FMYg.exe
- from C:\RCX6.tmp to <Current directory>\kswm.exe
- from C:\RCX1.tmp to <Current directory>\lEMq.exe
- from C:\RCX2.tmp to <Current directory>\oYsU.exe
- from C:\RCX3.tmp to <Current directory>\NUEu.exe
- from C:\RCXA.tmp to <Current directory>\AsEC.exe
- from C:\RCXB.tmp to <Current directory>\awkY.exe
- from C:\RCXC.tmp to <Current directory>\PQoA.exe
- from C:\RCX7.tmp to <Current directory>\GwAI.exe
- from C:\RCX8.tmp to <Current directory>\VMIG.exe
- from C:\RCX9.tmp to <Current directory>\TsMk.exe
- 'ap#.###coincharts.com':443
- '74.##5.232.51':80
- 74.##5.232.51/
- DNS ASK ma##.google.com
- DNS ASK ap#.###coincharts.com
- DNS ASK google.com
- ClassName: '' WindowName: 'Run'
- ClassName: 'ConsoleWindowClass' WindowName: ''
- ClassName: 'RegEdit_RegEdit' WindowName: ''
- ClassName: '' WindowName: 'Open'
- ClassName: 'WorkerW' WindowName: ''
- ClassName: 'DV2ControlHost' WindowName: ''
- ClassName: 'BUTTON' WindowName: 'START'
- ClassName: '' WindowName: 'Windows Internet Explorer'
- ClassName: '' WindowName: 'Microsoft Windows'
- ClassName: '' WindowName: 'AcIcUcAM.exe'
- ClassName: 'Indicator' WindowName: ''
- ClassName: '' WindowName: 'jaQEcQMQ.exe'
- ClassName: '' WindowName: 'Open File'
- ClassName: '' WindowName: 'mywMQEoQ'
- ClassName: 'Shell_TrayWnd' WindowName: ''