Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'syshost32' = '%WINDIR%\Installer\{2371EF69-220E-DBE2-5F3F-1A6635D0014A}\syshost.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\dee26b5f394337ab] 'ImagePath' = '<DRIVERS>\dee26b5f394337ab.sys'
- [<HKLM>\SYSTEM\ControlSet001\Services\dee26b5f394337ab] 'Start' = '00000000'
- [<HKLM>\SYSTEM\ControlSet001\Services\syshost32] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\2a781] 'Start' = '00000001'
- %WINDIR%\Installer\{2371EF69-220E-DBE2-5F3F-1A6635D0014A}\syshost.exe
- %WINDIR%\Installer\{2371EF69-220E-DBE2-5F3F-1A6635D0014A}\syshost.exe /service
- NtOpenThread, драйвер-обработчик: unknown
- NtOpenProcess, драйвер-обработчик: unknown
- <DRIVERS>\dee26b5f394337ab.sys
- <DRIVERS>\2a781.sys
- %WINDIR%\Installer\{2371EF69-220E-DBE2-5F3F-1A6635D0014A}\syshost.exe
- из <Полный путь к вирусу> в %TEMP%\924a49d6.tmp
- '62.##.229.131':80
- '62.##.229.126':80
- '20#.#6.232.182':80
- 62.##.229.131/cgi-bin/auth.cgi
- 62.##.229.126/cgi-bin/auth.cgi
- DNS ASK pr####wqgyjufyo.com
- DNS ASK rz####kzxufpwar.com
- DNS ASK wt###rdivql.com
- DNS ASK microsoft.com
- DNS ASK be####qcyhcj.com