Technical Information
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'lacMcYws.exe' = '%ALLUSERSPROFILE%\WuIEgAsU\lacMcYws.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'SSIkQYgQ.exe' = '%HOMEPATH%\gOEYMkgs\SSIkQYgQ.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe,%ALLUSERSPROFILE%\WuIEgAsU\lacMcYws.exe,'
- [<HKLM>\SYSTEM\ControlSet001\Services\vwYgEQEb] 'ImagePath' = '%ALLUSERSPROFILE%\tuIMYcEM\ZgMYMIIE.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\vwYgEQEb] 'Start' = '00000002'
- hidden files
- file extensions
- User Account Control (UAC)
- '<SYSTEM32>\reg.exe' add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
- '<SYSTEM32>\reg.exe' add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
- '<SYSTEM32>\reg.exe' add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
- '<SYSTEM32>\cmd.exe' /c "<Current directory>\<File name>"
- '%HOMEPATH%\gOEYMkgs\SSIkQYgQ.exe'
- '%ALLUSERSPROFILE%\WuIEgAsU\lacMcYws.exe'
- '%ALLUSERSPROFILE%\tuIMYcEM\ZgMYMIIE.exe'
- %HOMEPATH%\gOEYMkgs\VEoc.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\horses.bmp.exe
- %HOMEPATH%\gOEYMkgs\ZEQQ.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\guitar.bmp.exe
- %HOMEPATH%\gOEYMkgs\LwIk.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\lift-off.bmp.exe
- %HOMEPATH%\gOEYMkgs\owUo.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\kick.bmp.exe
- %HOMEPATH%\gOEYMkgs\NsEQ.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\drip.bmp.exe
- %HOMEPATH%\gOEYMkgs\GgMs.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\dog.bmp.exe
- %HOMEPATH%\gOEYMkgs\Qkcq.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\duck.bmp.exe
- %HOMEPATH%\gOEYMkgs\wIAC.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\frog.bmp.exe
- %HOMEPATH%\gOEYMkgs\VEEi.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\fish.bmp.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\palm tree.bmp.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\%USERNAME%.bmp.exe
- %HOMEPATH%\gOEYMkgs\VcYm.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\guest.bmp.exe
- %HOMEPATH%\gOEYMkgs\GggU.exe
- %ALLUSERSPROFILE%\Documents\My Music\Sample Music\Beethoven's Symphony No. 9 (Scherzo).wma.exe
- %TEMP%\WERe8f3.dir00\appcompat.txt
- %TEMP%\WERe8f3.dir00\manifest.txt
- %TEMP%\WERe8f3.dir00\ZgMYMIIE.exe.mdmp
- %TEMP%\WERe8f3.dir00\ZgMYMIIE.exe.hdmp
- %HOMEPATH%\gOEYMkgs\TEcc.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\red flower.bmp.exe
- %HOMEPATH%\gOEYMkgs\KMws.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\pink flower.bmp.exe
- %HOMEPATH%\gOEYMkgs\HcgC.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\snowflake.bmp.exe
- %HOMEPATH%\gOEYMkgs\xwcS.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\skater.bmp.exe
- %HOMEPATH%\gOEYMkgs\bkEy.exe
- %HOMEPATH%\gOEYMkgs\BIMe.exe
- %TEMP%\WERb7e7.dir00\ZgMYMIIE.exe.mdmp
- %TEMP%\WERb7e7.dir00\ZgMYMIIE.exe.hdmp
- %ALLUSERSPROFILE%\caQc.txt
- <Current directory>\<File name>
- %TEMP%\WERb7e7.dir00\appcompat.txt
- %TEMP%\WER22b2.dir00\ZgMYMIIE.exe.hdmp
- %TEMP%\WER22b2.dir00\appcompat.txt
- %TEMP%\WERb7e7.dir00\manifest.txt
- %TEMP%\WER22b2.dir00\ZgMYMIIE.exe.mdmp
- %HOMEPATH%\gOEYMkgs\SSIkQYgQ.exe
- %ALLUSERSPROFILE%\WuIEgAsU\lacMcYws.exe
- %HOMEPATH%\gOEYMkgs\SSIkQYgQ
- %ALLUSERSPROFILE%\WuIEgAsU\lacMcYws
- %ALLUSERSPROFILE%\tuIMYcEM\ZgMYMIIE.exe
- %TEMP%\WER3edd.dir00\appcompat.txt
- %TEMP%\WER3edd.dir00\manifest.txt
- %TEMP%\WER3edd.dir00\ZgMYMIIE.exe.mdmp
- %TEMP%\WER3edd.dir00\ZgMYMIIE.exe.hdmp
- %TEMP%\WER22b2.dir00\manifest.txt
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\car.bmp.exe
- %HOMEPATH%\gOEYMkgs\tUgm.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\butterfly.bmp.exe
- %HOMEPATH%\gOEYMkgs\oscW.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\cat.bmp.exe
- %HOMEPATH%\gOEYMkgs\DwoI.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\dirt bike.bmp.exe
- %HOMEPATH%\gOEYMkgs\Zwom.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\chess.bmp.exe
- %HOMEPATH%\gOEYMkgs\tYQk.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\astronaut.bmp.exe
- %HOMEPATH%\gOEYMkgs\tAUC.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\airplane.bmp.exe
- %HOMEPATH%\gOEYMkgs\BMom.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\beach.bmp.exe
- %HOMEPATH%\gOEYMkgs\lUgG.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\ball.bmp.exe
- %HOMEPATH%\gOEYMkgs\Jwwo.exe
- %HOMEPATH%\gOEYMkgs\LwIk.exe
- %HOMEPATH%\gOEYMkgs\NsEQ.exe
- %HOMEPATH%\gOEYMkgs\owUo.exe
- %HOMEPATH%\gOEYMkgs\wIAC.exe
- %HOMEPATH%\gOEYMkgs\ZEQQ.exe
- %HOMEPATH%\gOEYMkgs\VEoc.exe
- %HOMEPATH%\gOEYMkgs\KMws.exe
- %HOMEPATH%\gOEYMkgs\xwcS.exe
- %HOMEPATH%\gOEYMkgs\GggU.exe
- %HOMEPATH%\gOEYMkgs\VcYm.exe
- %HOMEPATH%\gOEYMkgs\TEcc.exe
- %HOMEPATH%\gOEYMkgs\HcgC.exe
- %HOMEPATH%\gOEYMkgs\bkEy.exe
- %HOMEPATH%\gOEYMkgs\VEEi.exe
- %HOMEPATH%\gOEYMkgs\BMom.exe
- %HOMEPATH%\gOEYMkgs\Jwwo.exe
- %HOMEPATH%\gOEYMkgs\lUgG.exe
- %TEMP%\CyUoAUQk.bat
- %HOMEPATH%\gOEYMkgs\tAUC.exe
- %HOMEPATH%\gOEYMkgs\tYQk.exe
- %HOMEPATH%\gOEYMkgs\oscW.exe
- %HOMEPATH%\gOEYMkgs\BIMe.exe
- %HOMEPATH%\gOEYMkgs\Qkcq.exe
- %HOMEPATH%\gOEYMkgs\GgMs.exe
- %HOMEPATH%\gOEYMkgs\tUgm.exe
- %HOMEPATH%\gOEYMkgs\Zwom.exe
- %HOMEPATH%\gOEYMkgs\DwoI.exe
- '74.##5.232.51':80
- http://google.com/ via 74.##5.232.51
- http:/// via 74.##5.232.51
- DNS ASK google.com
- ClassName: '' WindowName: 'SSIkQYgQ.exe'
- ClassName: '' WindowName: 'Microsoft Windows'
- ClassName: '' WindowName: 'lacMcYws.exe'