Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\RunOnce] 'windows updatess' = 'svchots.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices] 'windows updatess' = 'svchots.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'windows updatess' = 'svchots.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'windows updatess' = 'svchots.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce] 'windows updatess' = 'svchots.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\System Administrattor] 'Start' = '00000002'
- <SYSTEM32>\svchots.exe -netsvcs -bai <Полный путь к вирусу>
- <SYSTEM32>\svchots.exe
- %ALLUSERSPROFILE%\Application Data\Microsoft\Crypto\RSA\S-1-5-18\6d14e4b1d8ca773bab785d1be032546e_ffcb838e-6d3b-4e44-a259-8ac8f5c94c4f
- %WINDIR%\Temp\BIAH61abh284h1e.dll
- %APPDATA%\Microsoft\Protect\S-1-5-21-1275210071-117609710-1801674531-500\b17db71e-b0a1-4ec7-bfcf-2827fefdd5fc
- %APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-1275210071-117609710-1801674531-500\a18ca4003deb042bbee7a40f15e1970b_ffcb838e-6d3b-4e44-a259-8ac8f5c94c4f
- %TEMP%\BIAH61abh284h1e.dll
- 're####.#ontopentheboxes.com':13001
- DNS ASK re####.#ontopentheboxes.com
- ClassName: 'Indicator' WindowName: ''