Technical Information
- [<HKLM>\System\CurrentControlSet\Services\ProtractAntediluvian] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\ProtractAntediluvian] 'ImagePath' = '%ProgramFiles%\RudimentaryHypotenuse\NebulaFantasia.exe KernelTherapeutic'
- [<HKLM>\System\CurrentControlSet\Services\DeclivityDeclivity] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\DeclivityDeclivity] 'ImagePath' = '%ProgramFiles%\AverRudimentary\AntediluvianProtract.exe NebulaAntediluvian'
- %WINDIR%\suguzefhwd.dll
- %TEMP%\obsequiousenclosure.exe
- %ProgramFiles%\rudimentaryhypotenuse\nebulafantasia.exe
- %ProgramFiles%\averrudimentary\antediluvianprotract.exe
- <Full path to file>
- %ProgramFiles%\rudimentaryhypotenuse\nebulafantasia.exe
- %ProgramFiles%\averrudimentary\antediluvianprotract.exe
- '20#.#09.168.5':443
- DNS ASK bu####er.oCry.com
- ClassName: 'SUGUZEFHWD' WindowName: 'yoiipnbfsgtdgz'
- ClassName: 'SUGUZEFHWD' WindowName: ''
- '%TEMP%\obsequiousenclosure.exe'
- '%TEMP%\obsequiousenclosure.exe' ' (with hidden window)
- '%WINDIR%\syswow64\regsvr32.exe' /s "%WINDIR%\SUGUZEFHWD.dll"