Technical Information
- [HKLM\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run] 'oxqjudwrcrulsjaxcx' = '%WINDIR%\SysWOW64\srv2668.exe'
- [HKLM\SYSTEM\CurrentControlSet\Services\szmhenuoxlSv\Parameters] 'ServiceDll' = '%WINDIR%\SysWOW64\svcszmhenu.dll'
- [HKLM\System\CurrentControlSet\Services\szmhenuoxlSv] 'Start' = '00000002'
- [HKLM\System\CurrentControlSet\Services\szmhenuoxlSv] 'ImagePath' = '<SYSTEM32>\svchost.exe -k DcomSec'
- 'szmhenuoxlSv' <SYSTEM32>\svchost.exe -k DcomSec
- C:\logbot.txt
- %TEMP%\lis585c.tmp
- %WINDIR%\syswow64\srv2668.exe
- %WINDIR%\syswow64\svcszmhenu.dll
- %WINDIR%\temp\lsp5a8e.exe
- %TEMP%\lse5d0e.tmp
- C:\ttt.txt
- %WINDIR%\temp\lsp5a8e.exe
- 'co##############e-chains.prod.autograph.services.mozaws.net':443
- '34.##9.100.209':443
- DNS ASK co##############e-chains.prod.autograph.services.mozaws.net
- '%WINDIR%\temp\lsp5a8e.exe'
- '%WINDIR%\syswow64\svchost.exe' -k DcomSec
- '%WINDIR%\syswow64\cmd.exe' /c start "" "%WINDIR%\TEMP\lsp5A8E.exe"
- '%WINDIR%\syswow64\cmd.exe' /c start "" "%WINDIR%\TEMP\lsp5A8E.exe"' (with hidden window)