Technical Information
- [<HKCU>\software\microsoft\windows\currentversion\run] 'NAAUIMYE.exe' = '%HOMEPATH%\BowEowUY\NAAUIMYE.exe'
- [<HKLM>\software\Wow6432Node\microsoft\windows\currentversion\run] 'JUYkEYok.exe' = '%ALLUSERSPROFILE%\QMswIQYU\JUYkEYok.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe,%ALLUSERSPROFILE%\QMswIQYU\JUYkEYok.exe,'
- [<HKLM>\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = 'userinit.exe,%ALLUSERSPROFILE%\QMswIQYU\JUYkEYok.exe,'
- [<HKLM>\System\CurrentControlSet\Services\QAkkkgAx] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\QAkkkgAx] 'ImagePath' = '%ALLUSERSPROFILE%\mSoAwQUE\HIccQAcI.exe'
- 'QAkkkgAx' %ALLUSERSPROFILE%\mSoAwQUE\HIccQAcI.exe
- hidden files
- file extensions
- User Account Control (UAC)
- %HOMEPATH%\boweowuy\naauimye
- <Current directory>\jwse.exe
- <Current directory>\yoqo.exe
- <Current directory>\ckyq.exe
- <Current directory>\emqg.exe
- <Current directory>\essc.exe
- <Current directory>\skyq.exe
- <Current directory>\vayk.exe
- <Current directory>\qscy.exe
- <Current directory>\kmys.exe
- <Current directory>\jowi.exe
- <Current directory>\nsao.exe
- <Current directory>\kaca.exe
- <Current directory>\laoe.exe
- <Current directory>\aweo.exe
- <Current directory>\qiie.exe
- <Current directory>\dass.exe
- %TEMP%\iwscessy.bat
- %TEMP%\skiyaimo.bat
- <Current directory>\amyq.ico
- %ALLUSERSPROFILE%\lkqg.txt
- %TEMP%\neqkiwsy.bat
- <PATH_SAMPLE>
- %TEMP%\hiwqwgam.bat
- %WINDIR%\syswow64\config\systemprofile\boweowuy\naauimye
- %ALLUSERSPROFILE%\msoawque\hiccqaci.exe
- %ALLUSERSPROFILE%\qmswiqyu\juykeyok.exe
- %HOMEPATH%\boweowuy\naauimye.exe
- %ALLUSERSPROFILE%\qmswiqyu\juykeyok
- <Current directory>\ties.exe
- <Current directory>\pqqe.exe
- %TEMP%\hiwqwgam.bat
- <Current directory>\jwse.exe
- <Current directory>\yoqo.exe
- <Current directory>\ckyq.exe
- <Current directory>\emqg.exe
- <Current directory>\essc.exe
- <Current directory>\skyq.exe
- <Current directory>\vayk.exe
- <Current directory>\qscy.exe
- <Current directory>\kmys.exe
- <Current directory>\jowi.exe
- <Current directory>\nsao.exe
- <Current directory>\kaca.exe
- <Current directory>\laoe.exe
- <Current directory>\qiie.exe
- <Current directory>\ties.exe
- <Current directory>\dass.exe
- %TEMP%\iwscessy.bat
- %TEMP%\skiyaimo.bat
- %TEMP%\neqkiwsy.bat
- <Current directory>\aweo.exe
- <Current directory>\pqqe.exe
- http://google.com/
- DNS ASK bl##k.io
- DNS ASK google.com
- ClassName: '' WindowName: 'NAAUIMYE.exe'
- ClassName: '' WindowName: 'Microsoft Windows'
- ClassName: '' WindowName: 'JUYkEYok.exe'
- '%HOMEPATH%\boweowuy\naauimye.exe'
- '%ALLUSERSPROFILE%\qmswiqyu\juykeyok.exe'
- '%ALLUSERSPROFILE%\msoawque\hiccqaci.exe'
- '%WINDIR%\syswow64\reg.exe' add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1' (with hidden window)
- '%WINDIR%\syswow64\reg.exe' add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2' (with hidden window)
- '%WINDIR%\syswow64\reg.exe' add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c "<PATH_SAMPLE>"
- '%WINDIR%\syswow64\reg.exe' add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
- '%WINDIR%\syswow64\reg.exe' add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
- '%WINDIR%\syswow64\reg.exe' add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f