Technical Information
- [<HKCU>\software\Microsoft\Windows\CurrentVersion\Run] '4e569f4e764f86fd82601b7d6b3115ad' = '"%APPDATA%\exe.exe" ..'
- [<HKLM>\software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run] '4e569f4e764f86fd82601b7d6b3115ad' = '"%APPDATA%\exe.exe" ..'
- %APPDATA%\microsoft\windows\start menu\programs\startup\4e569f4e764f86fd82601b7d6b3115ad.exe
- <Drive name for removable media>:\4e569f4e764f86fd82601b7d6b3115ad.exe
- <Drive name for removable media>:\autorun.inf
- hidden files
- '%WINDIR%\syswow64\netsh.exe' firewall add allowedprogram "%APPDATA%\exe.exe" "exe.exe" ENABLE
- %APPDATA%\exe.exe
- <Drive name for removable media>:\4e569f4e764f86fd82601b7d6b3115ad.exe
- <Drive name for removable media>:\autorun.inf
- %APPDATA%\exe.exe
- %APPDATA%\microsoft\windows\start menu\programs\startup\4e569f4e764f86fd82601b7d6b3115ad.exe
- 'pu####te.ddns.net':1603
- DNS ASK pu####te.ddns.net
- '%APPDATA%\exe.exe'
- '%WINDIR%\syswow64\netsh.exe' firewall add allowedprogram "%APPDATA%\exe.exe" "exe.exe" ENABLE' (with hidden window)