Technical Information
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'ElkTBhTOiqUEWYN.exe' = '%TEMP%\ElkTBhTOiqUEWYN.exe'
- '%TEMP%\ElkTBhTOiqUEWYN.exe'
- %WINDIR%\Explorer.EXE
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\404[1].php
- %TEMP%\213609.exe
- %TEMP%\ElkTBhTOiqUEWYN.exe
- %TEMP%\VsgAVlkEhsnmOcX.dll
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\404[1].php
- from <Full path to virus> to %TEMP%\tmp1.tmp
- 'se###hmetal.org':80
- 'se####findfund.org':80
- se###hmetal.org/404.php?ty################################
- se####findfund.org/404.php?ty################################
- DNS ASK se###hmetal.org
- DNS ASK se####findfund.org
- ClassName: 'Indicator' WindowName: '(null)'
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'