Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'xmxm' = '%ALLUSERSPROFILE%\BHK\ctfmons.exe'
- %WINDIR%\sleep.exe 1
- <SYSTEM32>\taskkill.exe /F /IM "<Имя вируса>.exe"
- <SYSTEM32>\cmd.exe /c "%ALLUSERSPROFILE%\BHK\it.bat"
- <SYSTEM32>\attrib.exe -H "%ALLUSERSPROFILE%\BHK\ctfmons.exe"
- %ALLUSERSPROFILE%\BHK\it.bat
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\Rogers%20Exploit%20Maker(fixed)[1].exe
- %ALLUSERSPROFILE%\BHK\it.bat
- 'su###.#ersiangig.com':80
- 'localhost':1035
- su###.#ersiangig.com/Rogers%20Exploit%20Maker(fixed).exe
- DNS ASK su###.#ersiangig.com
- ClassName: 'Indicator' WindowName: ''
- ClassName: '' WindowName: ''
- ClassName: 'stetrs' WindowName: ''
- ClassName: 'dffgeed' WindowName: ''