Technical Information
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'aeEkEEcE.exe' = '%ALLUSERSPROFILE%\BWogoUMg\aeEkEEcE.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'pUccUkoM.exe' = '%HOMEPATH%\fCkYUMIQ\pUccUkoM.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\FkYQcQph] 'Start' = '00000002'
- hidden files
- file extensions
- User Account Control (UAC)
- '%ALLUSERSPROFILE%\lwQggIEM\nwAEcgMA.exe'
- '%ALLUSERSPROFILE%\BWogoUMg\aeEkEEcE.exe'
- '%HOMEPATH%\fCkYUMIQ\pUccUkoM.exe'
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\FgoUkkAc.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\bsIsMIsI.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\dQIogEYA.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\WIAUcAEI.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\kIEwQgIs.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\JMQQAYwI.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\lIkAUUUs.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\cYIosooU.bat" "<Full path to virus>""
- '<SYSTEM32>\reg.exe' /c ""%TEMP%\FecQAAEA.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\aassckEY.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\NMgswgIc.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\RwgIoUwM.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\wkcgIwMc.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\neUEoQEU.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\tOwMswkU.bat" "<Full path to virus>""
- '<SYSTEM32>\cscript.exe' %TEMP%\file.vbs
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\wIUQYkQM.bat" "<Full path to virus>""
- '<SYSTEM32>\reg.exe' add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
- '<SYSTEM32>\reg.exe' add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
- '<SYSTEM32>\reg.exe' add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\saEogsEw.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\jqokAEcs.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\pMksIQso.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\qqMwgAks.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\XikgoUsQ.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\TMEwMQIg.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\kegEYwEI.bat" "<Full path to virus>""
- <SYSTEM32>\reg.exe
- C:\RCXB.tmp
- %TEMP%\lIkAUUUs.bat
- %TEMP%\DQIUEgsw.bat
- %TEMP%\zQkEIoww.bat
- <Current directory>\yoAY.ico
- <Current directory>\oAQk.exe
- %TEMP%\NMgswgIc.bat
- %TEMP%\wkcgIwMc.bat
- %TEMP%\lgsYkwwA.bat
- <Current directory>\xigs.ico
- %TEMP%\dGcswwgs.bat
- %TEMP%\RwgIoUwM.bat
- %TEMP%\RCQMIoEc.bat
- %TEMP%\dQIogEYA.bat
- <Current directory>\EsIO.exe
- %TEMP%\JMQQAYwI.bat
- C:\RCXA.tmp
- %TEMP%\kIEwQgIs.bat
- %TEMP%\bmMAcMgQ.bat
- <Current directory>\ecgk.ico
- %TEMP%\QmYMcMAI.bat
- %TEMP%\FgoUkkAc.bat
- %TEMP%\bsIsMIsI.bat
- %TEMP%\peAIYIQw.bat
- %TEMP%\BwEwYEgg.bat
- %TEMP%\zkQokgMU.bat
- %TEMP%\PUkwoAoc.bat
- <Current directory>\cYUw.exe
- C:\RCX10.tmp
- <Current directory>\Egsk.ico
- <Current directory>\qIQg.exe
- C:\RCXF.tmp
- <Current directory>\BYwA.ico
- <Current directory>\JkgC.exe
- C:\RCX11.tmp
- <Current directory>\LiIA.ico
- <Current directory>\ecYK.exe
- C:\RCX13.tmp
- <Current directory>\UYYQ.ico
- <Current directory>\jMsg.exe
- C:\RCX12.tmp
- <Current directory>\DEAa.exe
- %TEMP%\FecQAAEA.bat
- %TEMP%\HMEcMsgc.bat
- %TEMP%\aassckEY.bat
- %TEMP%\cYIosooU.bat
- C:\RCXC.tmp
- %TEMP%\vEoEYIMg.bat
- <Current directory>\Oosk.ico
- <Current directory>\bAoi.exe
- C:\RCXE.tmp
- <Current directory>\swAc.ico
- <Current directory>\QYwK.exe
- C:\RCXD.tmp
- <Current directory>\hMEQ.ico
- C:\RCX2.tmp
- %TEMP%\XikgoUsQ.bat
- %TEMP%\NuwEUwkg.bat
- %ALLUSERSPROFILE%\casg.txt
- <Current directory>\ROMQ.ico
- <Current directory>\qUEI.exe
- %TEMP%\TMEwMQIg.bat
- %TEMP%\kegEYwEI.bat
- C:\RCX3.tmp
- %TEMP%\VIoAgskc.bat
- %TEMP%\siYIsMIw.bat
- <Current directory>\JWwo.ico
- <Current directory>\Yoko.exe
- %TEMP%\IQoEwAIE.bat
- <Current directory>\<Virus name>
- %TEMP%\tOwMswkU.bat
- %TEMP%\file.vbs
- %ALLUSERSPROFILE%\lwQggIEM\nwAEcgMA.exe
- %TEMP%\usYcAYMQ.bat
- %TEMP%\aAQoUUgI.bat
- %TEMP%\wIUQYkQM.bat
- %TEMP%\aowwUoMk.bat
- %TEMP%\saEogsEw.bat
- <Current directory>\tycM.ico
- <Current directory>\FoQY.exe
- C:\RCX1.tmp
- %TEMP%\jqokAEcs.bat
- <Current directory>\Dgka.exe
- %TEMP%\LeQYMwoE.bat
- C:\RCX8.tmp
- <Current directory>\rUcK.exe
- C:\RCX7.tmp
- <Current directory>\gOAw.ico
- %TEMP%\neUEoQEU.bat
- %TEMP%\WIAUcAEI.bat
- C:\RCX9.tmp
- %TEMP%\GsIUwwUk.bat
- %TEMP%\EegAYAEo.bat
- <Current directory>\aakg.ico
- <Current directory>\KkgY.exe
- <Current directory>\ACsI.ico
- C:\RCX4.tmp
- %TEMP%\pMksIQso.bat
- <Current directory>\fcIE.ico
- %TEMP%\cwkUYEsw.bat
- <Current directory>\jYsM.ico
- <Current directory>\SkMm.exe
- <Current directory>\ggwE.exe
- <Current directory>\xswm.exe
- C:\RCX6.tmp
- %TEMP%\qqMwgAks.bat
- C:\RCX5.tmp
- %TEMP%\SeEwocUI.bat
- <Current directory>\pWAA.ico
- %ALLUSERSPROFILE%\lwQggIEM\nwAEcgMA.exe
- %ALLUSERSPROFILE%\BWogoUMg\aeEkEEcE.exe
- %HOMEPATH%\fCkYUMIQ\pUccUkoM.exe
- <Current directory>\oAQk.exe
- %TEMP%\RCQMIoEc.bat
- %TEMP%\dGcswwgs.bat
- <Current directory>\yoAY.ico
- %TEMP%\HMEcMsgc.bat
- %TEMP%\vEoEYIMg.bat
- %TEMP%\lgsYkwwA.bat
- %TEMP%\DQIUEgsw.bat
- %TEMP%\PUkwoAoc.bat
- %TEMP%\zkQokgMU.bat
- %TEMP%\QmYMcMAI.bat
- %TEMP%\peAIYIQw.bat
- %TEMP%\zQkEIoww.bat
- <Current directory>\ecgk.ico
- <Current directory>\EsIO.exe
- <Current directory>\BYwA.ico
- <Current directory>\JkgC.exe
- <Current directory>\swAc.ico
- <Current directory>\qIQg.exe
- <Current directory>\UYYQ.ico
- <Current directory>\jMsg.exe
- <Current directory>\Egsk.ico
- <Current directory>\DEAa.exe
- %TEMP%\FecQAAEA.bat
- <Current directory>\xigs.ico
- <Current directory>\cYUw.exe
- <Current directory>\QYwK.exe
- <Current directory>\hMEQ.ico
- <Current directory>\bAoi.exe
- <Current directory>\Oosk.ico
- %TEMP%\bmMAcMgQ.bat
- %TEMP%\VIoAgskc.bat
- <Current directory>\ROMQ.ico
- <Current directory>\qUEI.exe
- <Current directory>\Yoko.exe
- <Current directory>\SkMm.exe
- %TEMP%\cwkUYEsw.bat
- <Current directory>\JWwo.ico
- %TEMP%\siYIsMIw.bat
- %TEMP%\aowwUoMk.bat
- %TEMP%\aAQoUUgI.bat
- %TEMP%\usYcAYMQ.bat
- <Current directory>\FoQY.exe
- %TEMP%\NuwEUwkg.bat
- %TEMP%\IQoEwAIE.bat
- <Current directory>\tycM.ico
- <Current directory>\gOAw.ico
- <Current directory>\Dgka.exe
- %TEMP%\LeQYMwoE.bat
- %TEMP%\EegAYAEo.bat
- <Current directory>\aakg.ico
- <Current directory>\KkgY.exe
- %TEMP%\GsIUwwUk.bat
- <Current directory>\ACsI.ico
- %TEMP%\SeEwocUI.bat
- <Current directory>\ggwE.exe
- <Current directory>\jYsM.ico
- <Current directory>\fcIE.ico
- <Current directory>\rUcK.exe
- <Current directory>\pWAA.ico
- <Current directory>\xswm.exe
- from C:\RCXC.tmp to <Current directory>\cYUw.exe
- from C:\RCXD.tmp to <Current directory>\QYwK.exe
- from C:\RCXA.tmp to <Current directory>\EsIO.exe
- from C:\RCXB.tmp to <Current directory>\oAQk.exe
- from C:\RCXE.tmp to <Current directory>\bAoi.exe
- from C:\RCX11.tmp to <Current directory>\qIQg.exe
- from C:\RCX12.tmp to <Current directory>\jMsg.exe
- from C:\RCXF.tmp to <Current directory>\DEAa.exe
- from C:\RCX10.tmp to <Current directory>\JkgC.exe
- from C:\RCX3.tmp to <Current directory>\Yoko.exe
- from C:\RCX4.tmp to <Current directory>\SkMm.exe
- from C:\RCX1.tmp to <Current directory>\FoQY.exe
- from C:\RCX2.tmp to <Current directory>\qUEI.exe
- from C:\RCX5.tmp to <Current directory>\ggwE.exe
- from C:\RCX8.tmp to <Current directory>\Dgka.exe
- from C:\RCX9.tmp to <Current directory>\KkgY.exe
- from C:\RCX6.tmp to <Current directory>\xswm.exe
- from C:\RCX7.tmp to <Current directory>\rUcK.exe
- '19#.#86.45.170':9999
- '74.##5.232.51':80
- '20#.#7.164.69':9999
- '20#.#19.204.12':9999
- 74.##5.232.51/
- DNS ASK google.com
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'Indicator' WindowName: ''