Technical Information
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe,%ALLUSERSPROFILE%\vesswIQA\AcIcUcAM.exe,'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'AcIcUcAM.exe' = '%ALLUSERSPROFILE%\vesswIQA\AcIcUcAM.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'jaQEcQMQ.exe' = '%HOMEPATH%\NIMMEwsg\jaQEcQMQ.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\FkYQcQph] 'Start' = '00000002'
- hidden files
- file extensions
- User Account Control (UAC)
- '%ALLUSERSPROFILE%\lwQggIEM\nwAEcgMA.exe'
- '%ALLUSERSPROFILE%\vesswIQA\AcIcUcAM.exe'
- '%HOMEPATH%\NIMMEwsg\jaQEcQMQ.exe'
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\jGIUEwkc.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\DYIgAwkc.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\aWQgoAwg.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\hoskocwE.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\MkUwIQUw.bat" "<Full path to virus>""
- '<SYSTEM32>\wbem\wmiadap.exe' /R /T
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\zwkYEcEA.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\AssAUIcA.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\eCAUksYw.bat" "<Full path to virus>""
- '<SYSTEM32>\reg.exe' add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\uOcUIsoY.bat" "<Full path to virus>""
- '<SYSTEM32>\reg.exe' add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
- '<SYSTEM32>\reg.exe' add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
- '<SYSTEM32>\cscript.exe' %TEMP%\file.vbs
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\oUgoEgYY.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\MyUgYgMY.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\sgIMcAQM.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\RKYkMkEQ.bat" "<Full path to virus>""
- <Current directory>\qUQU.ico
- <Current directory>\PcEC.exe
- C:\RCX10.tmp
- C:\RCXF.tmp
- C:\RCXE.tmp
- <Current directory>\GCkw.ico
- <Current directory>\JscS.exe
- <Current directory>\occg.exe
- C:\RCX12.tmp
- <Current directory>\sqQw.ico
- <Current directory>\uwwQ.ico
- <Current directory>\kSIc.ico
- <Current directory>\dYIc.exe
- C:\RCX11.tmp
- <Current directory>\hYoa.exe
- C:\RCXB.tmp
- <Current directory>\xIkE.ico
- <Current directory>\RWos.ico
- <Current directory>\hUQQ.ico
- <Current directory>\WsIg.exe
- C:\RCXA.tmp
- C:\RCXD.tmp
- <Current directory>\Zegg.ico
- <Current directory>\ycwI.exe
- <Current directory>\bwwY.exe
- <Current directory>\XMwG.exe
- C:\RCXC.tmp
- <Current directory>\eKgk.ico
- <Current directory>\ZswC.exe
- C:\RCX19.tmp
- <Current directory>\qOwk.ico
- <Current directory>\Dcck.ico
- <Current directory>\bQAs.ico
- <Current directory>\ZIAI.exe
- C:\RCX18.tmp
- <Current directory>\HUkE.exe
- <Current directory>\oucI.ico
- <Current directory>\wMEu.exe
- <Current directory>\MUQg.ico
- <Current directory>\roEM.exe
- C:\RCX1A.tmp
- %TEMP%\zwkYEcEA.bat
- C:\RCX14.tmp
- <Current directory>\hYsk.ico
- <Current directory>\tQEK.exe
- <Current directory>\hcMu.exe
- <Current directory>\NMoS.exe
- C:\RCX13.tmp
- <Current directory>\SKos.ico
- <Current directory>\xYAw.ico
- <Current directory>\YYEy.exe
- C:\RCX17.tmp
- C:\RCX16.tmp
- C:\RCX15.tmp
- <Current directory>\NIsE.ico
- <Current directory>\okAc.exe
- %TEMP%\eCAUksYw.bat
- %TEMP%\XYQgsUAY.bat
- %TEMP%\MyUgYgMY.bat
- %TEMP%\ucQwokcc.bat
- %TEMP%\oUgoEgYY.bat
- %TEMP%\RKYkMkEQ.bat
- <Current directory>\iWwk.ico
- %TEMP%\FeQMskow.bat
- <Current directory>\fwQs.ico
- <Current directory>\CwAm.exe
- C:\RCX3.tmp
- %TEMP%\WuwYkgQo.bat
- <Current directory>\fIEG.exe
- C:\RCX2.tmp
- %TEMP%\aWQgoAwg.bat
- %TEMP%\wGkIUcoY.bat
- %ALLUSERSPROFILE%\casg.txt
- %TEMP%\uOcUIsoY.bat
- <Current directory>\<Virus name>
- %ALLUSERSPROFILE%\lwQggIEM\nwAEcgMA.exe
- %TEMP%\QCYEIcgA.bat
- %TEMP%\file.vbs
- %TEMP%\sgIMcAQM.bat
- %TEMP%\beYssAcI.bat
- C:\RCX1.tmp
- %TEMP%\HqccoMgU.bat
- <Current directory>\AUQE.ico
- <Current directory>\jYAC.exe
- C:\RCX7.tmp
- %TEMP%\oWgIEUUo.bat
- <Current directory>\FWkA.ico
- <Current directory>\PgUA.exe
- %TEMP%\pikUYwcA.bat
- <Current directory>\HIwk.ico
- %TEMP%\MkUwIQUw.bat
- <Current directory>\sckk.ico
- <Current directory>\CUMW.exe
- C:\RCX9.tmp
- %TEMP%\TQIswcEo.bat
- %TEMP%\AssAUIcA.bat
- <Current directory>\MwAU.exe
- C:\RCX8.tmp
- C:\RCX4.tmp
- %TEMP%\jGIUEwkc.bat
- <Current directory>\ZCwo.ico
- <Current directory>\RAAE.exe
- %TEMP%\hoskocwE.bat
- <Current directory>\jmok.ico
- %TEMP%\NCswEQMc.bat
- <Current directory>\MIso.ico
- <Current directory>\XsIe.exe
- C:\RCX6.tmp
- %TEMP%\DYIgAwkc.bat
- <Current directory>\UcwU.exe
- %TEMP%\cWIQoYgI.bat
- C:\RCX5.tmp
- <Current directory>\dYIc.exe
- <Current directory>\kSIc.ico
- <Current directory>\PcEC.exe
- <Current directory>\qUQU.ico
- <Current directory>\NMoS.exe
- <Current directory>\sqQw.ico
- <Current directory>\occg.exe
- <Current directory>\uwwQ.ico
- <Current directory>\GCkw.ico
- <Current directory>\xIkE.ico
- <Current directory>\bwwY.exe
- <Current directory>\RWos.ico
- <Current directory>\XMwG.exe
- <Current directory>\Zegg.ico
- <Current directory>\JscS.exe
- <Current directory>\eKgk.ico
- <Current directory>\ycwI.exe
- <Current directory>\Dcck.ico
- <Current directory>\roEM.exe
- <Current directory>\bQAs.ico
- <Current directory>\ZswC.exe
- <SYSTEM32>\wbem\Performance\WmiApRpl.ini
- <SYSTEM32>\PerfStringBackup.TMP
- <Current directory>\qOwk.ico
- <Current directory>\MUQg.ico
- <Current directory>\ZIAI.exe
- <Current directory>\tQEK.exe
- <Current directory>\hYsk.ico
- <Current directory>\hcMu.exe
- <Current directory>\SKos.ico
- <Current directory>\YYEy.exe
- <Current directory>\xYAw.ico
- <Current directory>\okAc.exe
- <Current directory>\NIsE.ico
- %TEMP%\WuwYkgQo.bat
- <Current directory>\CwAm.exe
- <Current directory>\fIEG.exe
- <Current directory>\iWwk.ico
- <Current directory>\RAAE.exe
- <Current directory>\jmok.ico
- <Current directory>\fwQs.ico
- %TEMP%\NCswEQMc.bat
- %TEMP%\ucQwokcc.bat
- %TEMP%\HqccoMgU.bat
- %TEMP%\beYssAcI.bat
- %TEMP%\QCYEIcgA.bat
- %TEMP%\wGkIUcoY.bat
- %TEMP%\FeQMskow.bat
- %TEMP%\XYQgsUAY.bat
- <Current directory>\jYAC.exe
- <Current directory>\AUQE.ico
- <Current directory>\FWkA.ico
- <Current directory>\CUMW.exe
- <Current directory>\MwAU.exe
- %TEMP%\TQIswcEo.bat
- <Current directory>\hUQQ.ico
- <Current directory>\hYoa.exe
- <Current directory>\sckk.ico
- <Current directory>\WsIg.exe
- %TEMP%\oWgIEUUo.bat
- <Current directory>\ZCwo.ico
- %TEMP%\pikUYwcA.bat
- %TEMP%\cWIQoYgI.bat
- <Current directory>\UcwU.exe
- <Current directory>\PgUA.exe
- <Current directory>\HIwk.ico
- <Current directory>\XsIe.exe
- <Current directory>\MIso.ico
- from C:\RCX11.tmp to <Current directory>\dYIc.exe
- from C:\RCX12.tmp to <Current directory>\occg.exe
- from C:\RCX13.tmp to <Current directory>\NMoS.exe
- from C:\RCXE.tmp to <Current directory>\ycwI.exe
- from C:\RCXF.tmp to <Current directory>\JscS.exe
- from C:\RCX10.tmp to <Current directory>\PcEC.exe
- from C:\RCX14.tmp to <Current directory>\hcMu.exe
- from C:\RCX18.tmp to <Current directory>\ZIAI.exe
- from C:\RCX19.tmp to <Current directory>\ZswC.exe
- from C:\RCX1A.tmp to <Current directory>\roEM.exe
- from C:\RCX15.tmp to <Current directory>\tQEK.exe
- from C:\RCX16.tmp to <Current directory>\okAc.exe
- from C:\RCX17.tmp to <Current directory>\YYEy.exe
- from C:\RCX4.tmp to <Current directory>\RAAE.exe
- from C:\RCX5.tmp to <Current directory>\UcwU.exe
- from C:\RCX6.tmp to <Current directory>\XsIe.exe
- from C:\RCX1.tmp to <Current directory>\jYAC.exe
- from C:\RCX2.tmp to <Current directory>\fIEG.exe
- from C:\RCX3.tmp to <Current directory>\CwAm.exe
- from C:\RCX7.tmp to <Current directory>\PgUA.exe
- from C:\RCXB.tmp to <Current directory>\hYoa.exe
- from C:\RCXC.tmp to <Current directory>\XMwG.exe
- from C:\RCXD.tmp to <Current directory>\bwwY.exe
- from C:\RCX8.tmp to <Current directory>\MwAU.exe
- from C:\RCX9.tmp to <Current directory>\CUMW.exe
- from C:\RCXA.tmp to <Current directory>\WsIg.exe
- '74.##5.232.51':80
- 74.##5.232.51/
- DNS ASK google.com
- ClassName: '' WindowName: 'jaQEcQMQ.exe'
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: '' WindowName: 'Microsoft Windows'
- ClassName: 'Indicator' WindowName: ''
- ClassName: '' WindowName: 'AcIcUcAM.exe'