Technical Information
- [<HKCU>\Software\Microsoft\Windows NT\CurrentVersion\Winlogon] 'shell' = '%APPDATA%\rX4ZehzY\DvskGC3.exe,explorer.exe'
- '<SYSTEM32>\reg.exe' add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v shell /t REG_SZ /d "%APPDATA%\rX4ZehzY\DvskGC3.exe,explorer.exe"
- '<SYSTEM32>\wbem\wmiadap.exe' /R /T
- %APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2052111302-484763869-725345543-1003\4cc2fbde2451705f80cbc9afd4d457a7_23ef5514-3059-436f-a4a7-4cefaab20eb1
- %APPDATA%\Proton\8.11.2014\16.log
- %APPDATA%\rX4ZehzY\30
- <Full path to virus>
- <SYSTEM32>\PerfStringBackup.TMP
- <SYSTEM32>\wbem\Performance\WmiApRpl.ini
- from %APPDATA%\rX4ZehzY\30 to %APPDATA%\rX4ZehzY\DvskGC3.exe
- 'si#####41235.zapto.org':1604
- DNS ASK si#####41235.zapto.org