Technical Information
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'aeEkEEcE.exe' = '%ALLUSERSPROFILE%\BWogoUMg\aeEkEEcE.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'pUccUkoM.exe' = '%HOMEPATH%\fCkYUMIQ\pUccUkoM.exe'
- hidden files
- file extensions
- User Account Control (UAC)
- '%ALLUSERSPROFILE%\BWogoUMg\aeEkEEcE.exe'
- '%HOMEPATH%\fCkYUMIQ\pUccUkoM.exe'
- '<SYSTEM32>\reg.exe' /pid=3244
- '<SYSTEM32>\reg.exe' /pid=3544
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\XSAYIcsA.bat" "<Full path to virus>""
- '<SYSTEM32>\reg.exe' /pid=188
- '<SYSTEM32>\reg.exe' /pid=3724
- '<SYSTEM32>\reg.exe' /c ""%TEMP%\WEsUsMAY.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\nCYgYMsQ.bat" "<Full path to virus>""
- '<SYSTEM32>\cscript.exe' /c ""%TEMP%\xkYUYMMg.bat" "<Full path to virus>""
- '<SYSTEM32>\reg.exe' /pid=3380
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\GiwEIgEw.bat" "<Full path to virus>""
- '<SYSTEM32>\taskkill.exe' add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
- '<SYSTEM32>\reg.exe' /pid=3612
- '<SYSTEM32>\reg.exe' /pid=3364
- '<SYSTEM32>\reg.exe' /pid=3996
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\tSkoQoYg.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\XsMsQQUQ.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\RiIEUAME.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\MOMAUsIU.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\QgQEwsko.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\jokkkAMU.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\mAAQIAIE.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\BAQIkggY.bat" "<Full path to virus>""
- '<SYSTEM32>\reg.exe' /pid=3104
- '<SYSTEM32>\reg.exe' /pid=3744
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\AKksAcEc.bat" "<Full path to virus>""
- '<SYSTEM32>\reg.exe' /pid=4040
- '<SYSTEM32>\reg.exe' /c ""%TEMP%\CsAEAAYg.bat" "<Full path to virus>""
- '<SYSTEM32>\taskkill.exe' /FI "USERNAME eq %USERNAME%" /F /IM aeEkEEcE.exe
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\HysckwEY.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\xcQksgAo.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\pSYEgQMg.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\giIswMUI.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\bUEUcQYM.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\wesEIkIE.bat" "<Full path to virus>""
- '<SYSTEM32>\reg.exe' add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
- '<SYSTEM32>\reg.exe' add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
- '<SYSTEM32>\reg.exe' add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
- '<SYSTEM32>\cscript.exe' %TEMP%\file.vbs
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\JuUIcUkE.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\IwcMwQwg.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\tsUQgsIo.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\FuUYgcMU.bat" "<Full path to virus>""
- '<SYSTEM32>\cscript.exe' add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
- '<SYSTEM32>\reg.exe' /pid=2600
- '<SYSTEM32>\cscript.exe' /pid=2864
- '<SYSTEM32>\reg.exe' /pid=2856
- '<SYSTEM32>\reg.exe' /c ""%TEMP%\FMsMIsUo.bat" "<Full path to virus>""
- '<SYSTEM32>\reg.exe' /c "<Current directory>\<Virus name>"
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\GAIcsoQs.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\LAwcMkQY.bat" "<Full path to virus>""
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\aCYEYgoY.bat" "<Full path to virus>""
- '<SYSTEM32>\reg.exe' /pid=2716
- '<SYSTEM32>\reg.exe' /pid=2744
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\TIoccoAU.bat" "<Full path to virus>""
- <SYSTEM32>\cscript.exe
- <SYSTEM32>\taskkill.exe
- <SYSTEM32>\reg.exe
- <SYSTEM32>\cmd.exe
- C:\RCXA.tmp
- %TEMP%\mAAQIAIE.bat
- %TEMP%\bkMcAUQU.bat
- <Current directory>\cUQU.exe
- %TEMP%\tiAYsIcg.bat
- %TEMP%\AKksAcEc.bat
- <Current directory>\LEcc.ico
- %TEMP%\DokkIkQA.bat
- <Current directory>\UkQQ.ico
- <Current directory>\XUUQ.exe
- %TEMP%\RiIEUAME.bat
- <Current directory>\MUYY.ico
- <Current directory>\FMwc.exe
- C:\RCXB.tmp
- C:\RCX9.tmp
- C:\RCX7.tmp
- %TEMP%\PUYgAEks.bat
- %TEMP%\BAQIkggY.bat
- <Current directory>\jIgE.exe
- <Current directory>\fYAg.exe
- C:\RCX6.tmp
- <Current directory>\EEYa.ico
- %TEMP%\zAYkUQog.bat
- <Current directory>\IMUu.ico
- <Current directory>\xEUy.exe
- %TEMP%\CsAEAAYg.bat
- <Current directory>\oUkw.ico
- <Current directory>\RccK.exe
- C:\RCX8.tmp
- C:\RCXC.tmp
- <Current directory>\jsMq.exe
- C:\RCX11.tmp
- %TEMP%\CYEckMcU.bat
- <Current directory>\QYQI.ico
- <Current directory>\vUUS.ico
- <Current directory>\eUcq.exe
- C:\RCX10.tmp
- %TEMP%\gqokIkYU.bat
- C:\RCX12.tmp
- <Current directory>\TwcY.ico
- <Current directory>\NQMO.exe
- %TEMP%\QgQEwsko.bat
- %TEMP%\MOMAUsIU.bat
- <Current directory>\UYgU.ico
- %TEMP%\YscIsgcc.bat
- C:\RCXD.tmp
- <Current directory>\CsgW.ico
- <Current directory>\ZwcM.exe
- <Current directory>\VgAk.exe
- %TEMP%\XsMsQQUQ.bat
- <Current directory>\fwUy.ico
- %TEMP%\hkQksYos.bat
- <Current directory>\mcki.exe
- C:\RCXF.tmp
- %TEMP%\jokkkAMU.bat
- <Current directory>\xsMY.ico
- C:\RCXE.tmp
- %TEMP%\cScQYQgs.bat
- %TEMP%\tSkoQoYg.bat
- <Current directory>\vUIA.ico
- %TEMP%\TsIQQgwk.bat
- %TEMP%\NoMsQoEo.bat
- %TEMP%\tsUQgsIo.bat
- %TEMP%\pSYEgQMg.bat
- %TEMP%\sCoIwoAw.bat
- %TEMP%\ySsQkUsA.bat
- %TEMP%\giIswMUI.bat
- %TEMP%\OYIIscoM.bat
- %TEMP%\GAIcsoQs.bat
- %TEMP%\TIoccoAU.bat
- %TEMP%\faYgEwQw.bat
- %TEMP%\aaYsYYQI.bat
- %TEMP%\aCYEYgoY.bat
- %TEMP%\LAwcMkQY.bat
- %TEMP%\bUEUcQYM.bat
- %TEMP%\hkkUEQok.bat
- %TEMP%\JuUIcUkE.bat
- %TEMP%\file.vbs
- %TEMP%\IwcMwQwg.bat
- %TEMP%\iEgYQsoE.bat
- <Current directory>\<Virus name>
- %TEMP%\vyIUcAMg.bat
- %TEMP%\HysckwEY.bat
- %TEMP%\LsQIYogU.bat
- %TEMP%\xcQksgAo.bat
- %TEMP%\WUsgEosg.bat
- %TEMP%\wesEIkIE.bat
- %TEMP%\viUksAkA.bat
- %TEMP%\nyoMMQUw.bat
- <Current directory>\VcIi.ico
- <Current directory>\rYoq.exe
- %TEMP%\XSAYIcsA.bat
- %TEMP%\nCYgYMsQ.bat
- <Current directory>\VMUq.exe
- C:\RCX3.tmp
- %TEMP%\HyUAcgYQ.bat
- %TEMP%\WEsUsMAY.bat
- C:\RCX5.tmp
- %TEMP%\TEEYAYks.bat
- <Current directory>\yQcU.exe
- C:\RCX4.tmp
- %TEMP%\ziggcEEM.bat
- <Current directory>\TIkE.ico
- <Current directory>\yUwq.ico
- <Current directory>\RQwM.ico
- <Current directory>\lcce.exe
- C:\RCX1.tmp
- %TEMP%\EEgkwQwU.bat
- %TEMP%\buQUoEwI.bat
- %TEMP%\FuUYgcMU.bat
- %TEMP%\FMsMIsUo.bat
- %TEMP%\xkYUYMMg.bat
- C:\RCX2.tmp
- %TEMP%\oywwsIMQ.bat
- <Current directory>\OYgw.exe
- %TEMP%\kGkoYYgA.bat
- %TEMP%\GiwEIgEw.bat
- <Current directory>\yssk.ico
- %ALLUSERSPROFILE%\BWogoUMg\aeEkEEcE.exe
- %HOMEPATH%\fCkYUMIQ\pUccUkoM.exe
- <Current directory>\LEcc.ico
- %TEMP%\bkMcAUQU.bat
- %TEMP%\tiAYsIcg.bat
- <Current directory>\cUQU.exe
- %TEMP%\DokkIkQA.bat
- <Current directory>\XUUQ.exe
- <Current directory>\FMwc.exe
- <Current directory>\MUYY.ico
- <Current directory>\IMUu.ico
- %TEMP%\WEsUsMAY.bat
- <Current directory>\RccK.exe
- <Current directory>\EEYa.ico
- %TEMP%\PUYgAEks.bat
- <Current directory>\xEUy.exe
- %TEMP%\CsAEAAYg.bat
- <Current directory>\oUkw.ico
- %TEMP%\zAYkUQog.bat
- <Current directory>\UkQQ.ico
- <Current directory>\jsMq.exe
- %TEMP%\CYEckMcU.bat
- %TEMP%\YscIsgcc.bat
- <Current directory>\vUUS.ico
- <Current directory>\NQMO.exe
- <Current directory>\UYgU.ico
- <Current directory>\QYQI.ico
- %TEMP%\gqokIkYU.bat
- <Current directory>\eUcq.exe
- <Current directory>\fwUy.ico
- <Current directory>\ZwcM.exe
- <Current directory>\VgAk.exe
- %TEMP%\hkQksYos.bat
- <Current directory>\mcki.exe
- <Current directory>\xsMY.ico
- %TEMP%\cScQYQgs.bat
- <Current directory>\CsgW.ico
- <Current directory>\jIgE.exe
- %TEMP%\faYgEwQw.bat
- %TEMP%\OYIIscoM.bat
- %TEMP%\NoMsQoEo.bat
- %TEMP%\aaYsYYQI.bat
- %TEMP%\EEgkwQwU.bat
- <Current directory>\lcce.exe
- %TEMP%\nyoMMQUw.bat
- %TEMP%\buQUoEwI.bat
- %TEMP%\TsIQQgwk.bat
- %TEMP%\WUsgEosg.bat
- %TEMP%\viUksAkA.bat
- %TEMP%\iEgYQsoE.bat
- %TEMP%\hkkUEQok.bat
- %TEMP%\sCoIwoAw.bat
- %TEMP%\ySsQkUsA.bat
- %TEMP%\vyIUcAMg.bat
- %TEMP%\LsQIYogU.bat
- %TEMP%\kGkoYYgA.bat
- <Current directory>\yQcU.exe
- <Current directory>\TIkE.ico
- <Current directory>\VcIi.ico
- %TEMP%\FMsMIsUo.bat
- %TEMP%\TEEYAYks.bat
- <Current directory>\vUIA.ico
- %TEMP%\xkYUYMMg.bat
- <Current directory>\fYAg.exe
- <Current directory>\rYoq.exe
- <Current directory>\yssk.ico
- %TEMP%\oywwsIMQ.bat
- <Current directory>\RQwM.ico
- <Current directory>\OYgw.exe
- %TEMP%\HyUAcgYQ.bat
- %TEMP%\ziggcEEM.bat
- <Current directory>\VMUq.exe
- <Current directory>\yUwq.ico
- from C:\RCXC.tmp to <Current directory>\XUUQ.exe
- from C:\RCXD.tmp to <Current directory>\VgAk.exe
- from C:\RCXA.tmp to <Current directory>\cUQU.exe
- from C:\RCXB.tmp to <Current directory>\FMwc.exe
- from C:\RCXE.tmp to <Current directory>\ZwcM.exe
- from C:\RCX11.tmp to <Current directory>\jsMq.exe
- from C:\RCX12.tmp to <Current directory>\NQMO.exe
- from C:\RCXF.tmp to <Current directory>\mcki.exe
- from C:\RCX10.tmp to <Current directory>\eUcq.exe
- from C:\RCX3.tmp to <Current directory>\VMUq.exe
- from C:\RCX4.tmp to <Current directory>\rYoq.exe
- from C:\RCX1.tmp to <Current directory>\lcce.exe
- from C:\RCX2.tmp to <Current directory>\OYgw.exe
- from C:\RCX5.tmp to <Current directory>\yQcU.exe
- from C:\RCX8.tmp to <Current directory>\RccK.exe
- from C:\RCX9.tmp to <Current directory>\xEUy.exe
- from C:\RCX6.tmp to <Current directory>\fYAg.exe
- from C:\RCX7.tmp to <Current directory>\jIgE.exe
- '19#.#86.45.170':9999
- '74.##5.232.51':80
- '20#.#7.164.69':9999
- '20#.#19.204.12':9999
- 74.##5.232.51/
- DNS ASK google.com
- ClassName: '' WindowName: 'Microsoft Windows'
- ClassName: '' WindowName: ''
- ClassName: '' WindowName: 'pUccUkoM.exe'
- ClassName: 'Indicator' WindowName: ''
- ClassName: '' WindowName: 'aeEkEEcE.exe'