Technical Information
- [HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'svchost' = '%ALLUSERSPROFILE%\svchost.exe'
- [HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'system' = '%ALLUSERSPROFILE%\system.exe'
- <SYSTEM32>\tasks\svchost
- <SYSTEM32>\tasks\system
- %APPDATA%\microsoft\windows\start menu\programs\startup\svchost.lnk
- %APPDATA%\microsoft\windows\start menu\programs\startup\system.lnk
- <Drive name for removable media>:\system.exe
- <Drive name for removable media>:\7790_preview.pdf.lnk
- <Drive name for removable media>:\2015-02-worms-nanoparticle-toxicity.pdf.lnk
- <Drive name for removable media>:\video_1.mp4.lnk
- <Drive name for removable media>:\51.mp4.lnk
- <Drive name for removable media>:\video.mp4.lnk
- <Drive name for removable media>:\clip_480_5sec_6mbps_h264.mp4.lnk
- <Drive name for removable media>:\ff_ot_user_guide.pdf.lnk
- <Drive name for removable media>:\scan.mov.lnk
- <Drive name for removable media>:\2.jpg.lnk
- <Drive name for removable media>:\region-north-karelia.jpg.lnk
- <Drive name for removable media>:\210252809.jpg.lnk
- <Drive name for removable media>:\168.jpg.lnk
- <Drive name for removable media>:\parnas_01.jpg.lnk
- <Drive name for removable media>:\3.jpg.lnk
- <Drive name for removable media>:\1189.jpg.lnk
- <Drive name for removable media>:\fil_20060629111052.pdf.lnk
- <Drive name for removable media>:\2015-02-patients-topic-work-related-asthma-jobs.pdf.lnk
- <Drive name for removable media>:\lom602.pdf.lnk
- <Drive name for removable media>:\asaprojectcompetition.pptx.lnk
- <Drive name for removable media>:\waterresourcesag.pptx.lnk
- <Drive name for removable media>:\accountsreceivable.ppt.lnk
- <Drive name for removable media>:\sim_gametheory_to_finance.ppt.lnk
- <Drive name for removable media>:\ppswamp.ppt.lnk
- <Drive name for removable media>:\sacs_presentation_sacs_qep_improving_rt_education_final.ppt.lnk
- <Drive name for removable media>:\proposaltemplates.ppt.lnk
- <Drive name for removable media>:\arrow-down.png.lnk
- <Drive name for removable media>:\breakpoint.png.lnk
- <Drive name for removable media>:\irgeek.pem.lnk
- <Drive name for removable media>:\cert.pem.lnk
- <Drive name for removable media>:\hhhlcert.pem.lnk
- <Drive name for removable media>:\delongcacert.pem.lnk
- <Drive name for removable media>:\investmentbankca_ca8.pem.lnk
- <Drive name for removable media>:\ck_ugo.pem.lnk
- <Drive name for removable media>:\region-north-karelia.jpeg.lnk
- <Drive name for removable media>:\roozenedowebinar.pptx.lnk
- <Drive name for removable media>:\210252809.jpeg.lnk
- <Drive name for removable media>:\tree_view.html.lnk
- <Drive name for removable media>:\508softwareandos.doc.lnk
- <Drive name for removable media>:\lisp_success.doc.lnk
- <Drive name for removable media>:\testcertificate.cer.lnk
- <Drive name for removable media>:\testee.cer.lnk
- <Drive name for removable media>:\sdkfailsafeemulator.cer.lnk
- <Drive name for removable media>:\sdksampleprivdeveloper.cer.lnk
- <Drive name for removable media>:\february_catalogue__2015.doc.lnk
- <Drive name for removable media>:\contosoroot.cer.lnk
- <Drive name for removable media>:\dial.bmp.lnk
- <Drive name for removable media>:\coffee.bmp.lnk
- <Drive name for removable media>:\dashborder_96.bmp.lnk
- <Drive name for removable media>:\archer.avi.lnk
- <Drive name for removable media>:\join.avi.lnk
- <Drive name for removable media>:\000814251_video_01.avi.lnk
- <Drive name for removable media>:\toolbar.bmp.lnk
- <Drive name for removable media>:\ovp25012015.doc.lnk
- <Drive name for removable media>:\cveuropeo.doc.lnk
- <Drive name for removable media>:\hadac_newsletter_july_2010_final.docx.lnk
- <Drive name for removable media>:\api-hashmap.html.lnk
- <Drive name for removable media>:\adadsi.html.lnk
- <Drive name for removable media>:\browse.html.lnk
- <Drive name for removable media>:\alert.htm.lnk
- <Drive name for removable media>:\trivial-merge.htm.lnk
- <Drive name for removable media>:\garden.htm.lnk
- <Drive name for removable media>:\advice_process.htm.lnk
- <Drive name for removable media>:\browse.htm.lnk
- <Drive name for removable media>:\about.htm.lnk
- <Drive name for removable media>:\chromesetup.exe.lnk
- <Drive name for removable media>:\jre-7u75-windows-i586-iftw.exe.lnk
- <Drive name for removable media>:\wrar520.exe.lnk
- <Drive name for removable media>:\utorrent.exe.lnk
- <Drive name for removable media>:\tcm851ax32.exe.lnk
- <Drive name for removable media>:\skypesetup.exe.lnk
- <Drive name for removable media>:\iisstart.html.lnk
- <Drive name for removable media>:\hypothyroidism_slides.pptx.lnk
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath '%HOMEPATH%\svchost.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath '%APPDATA%\system.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath '%ALLUSERSPROFILE%\svchost.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath '%ALLUSERSPROFILE%\system.exe'
- %LOCALAPPDATA%\blacknet.exe
- %HOMEPATH%\vbs.exe
- %APPDATA%\system.exe
- %HOMEPATH%\svchost.exe
- %ALLUSERSPROFILE%\svchost.exe
- %ALLUSERSPROFILE%\system.exe
- <Drive name for removable media>:\system.exe
- %ALLUSERSPROFILE%\svchost.exe
- %ALLUSERSPROFILE%\system.exe
- %ALLUSERSPROFILE%\svchost.exe
- %ALLUSERSPROFILE%\system.exe
- DNS ASK ip##pi.com
- DNS ASK fv###ool.com
- '%LOCALAPPDATA%\blacknet.exe'
- '%HOMEPATH%\vbs.exe'
- '%APPDATA%\system.exe'
- '%HOMEPATH%\svchost.exe'
- '%WINDIR%\syswow64\windowspowershell\v1.0\powershell.exe' -EncodedCommand "PAAjAGoAcgB1ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGwAagBrACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwA...' (with hidden window)
- '<SYSTEM32>\schtasks.exe' /create /f /RL HIGHEST /sc minute /mo 1 /tn "system" /tr "%ALLUSERSPROFILE%\system.exe"' (with hidden window)
- '<SYSTEM32>\schtasks.exe' /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "%ALLUSERSPROFILE%\svchost.exe"' (with hidden window)
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath '%ALLUSERSPROFILE%\system.exe'' (with hidden window)
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath '%ALLUSERSPROFILE%\svchost.exe'' (with hidden window)
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath '%APPDATA%\system.exe'' (with hidden window)
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath '%HOMEPATH%\svchost.exe'' (with hidden window)
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'' (with hidden window)
- '%ALLUSERSPROFILE%\svchost.exe' ' (with hidden window)
- '%HOMEPATH%\svchost.exe' ' (with hidden window)
- '%APPDATA%\system.exe' ' (with hidden window)
- '%HOMEPATH%\vbs.exe' ' (with hidden window)
- '%LOCALAPPDATA%\blacknet.exe' ' (with hidden window)
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'system.exe'' (with hidden window)
- '%ALLUSERSPROFILE%\system.exe' ' (with hidden window)
- '%WINDIR%\syswow64\windowspowershell\v1.0\powershell.exe' -EncodedCommand "PAAjAGoAcgB1ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGwAagBrACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwA...
- '%WINDIR%\microsoft.net\framework64\v2.0.50727\dw20.exe' -x -s 796
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'system.exe'
- '<SYSTEM32>\schtasks.exe' /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "%ALLUSERSPROFILE%\svchost.exe"
- '<SYSTEM32>\schtasks.exe' /create /f /RL HIGHEST /sc minute /mo 1 /tn "system" /tr "%ALLUSERSPROFILE%\system.exe"
- '<SYSTEM32>\taskeng.exe' {14D4802C-6F22-42E6-A650-3AB9C826BCC6} S-1-5-21-1960123792-2022915161-3775307078-1001:oqomamkpejz\user:Interactive:[1]