Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'EthernetInc' = '%APPDATA%\FlashDriveData\ethernetdriver.exe'
- '%APPDATA%\FlashDriveData\displaydrivers.exe' -a scrypt -g no -ostratum+tcp://usa.wemineltc.com:3334 -u proswapx.1 -p x -t 2
- '%APPDATA%\FlashDriveData\displaydrivers.exe' (загружен из сети Интернет)
- '<SYSTEM32>\attrib.exe' -s -h %APPDATA%\FlashDriveData
- %APPDATA%\FlashDriveData\openssl.dll
- %APPDATA%\FlashDriveData\phatk.cl
- %APPDATA%\FlashDriveData\usft_ext.dll
- %APPDATA%\FlashDriveData\mpir.dll
- %APPDATA%\FlashDriveData\displaydrivers.exe
- %APPDATA%\FlashDriveData\coinutil.dll
- %APPDATA%\FlashDriveData\miner.dll
- из <Полный путь к вирусу> в %APPDATA%\FlashDriveData\ethernetdriver.exe
- '19#.#0.57.179':80
- 'wp#d':80
- 19#.#0.57.179/sovikat/openssl.dll
- 19#.#0.57.179/sovikat/mpir.dll
- 19#.#0.57.179/sovikat/usft_ext.dll
- 19#.#0.57.179/sovikat/phatk.cl
- 19#.#0.57.179/sovikat/coin-miner.exe
- wp#d/wpad.dat
- 19#.#0.57.179/sovikat/miner.dll
- 19#.#0.57.179/sovikat/coinutil.dll
- DNS ASK wp#d
- ClassName: 'Indicator' WindowName: '(null)'