Техническая информация
- [<HKLM>\SYSTEM\ControlSet001\Services\DCB58BD0A.sys] 'ImagePath' = '%WINDIR%\temp\DCB58BD0A.sys'
- [<HKLM>\SYSTEM\ControlSet001\Services\srservice] 'Start' = '00000002'
- '<SYSTEM32>\srservice.exe'
- '<SYSTEM32>\wscp.exe' <SYSTEM32>\f9c5d3df84f48502d03492792b27ed95.vbs //B
- '<SYSTEM32>\srservice.exe' exec
- '<SYSTEM32>\srservice.exe' move c728f402185f03b035b81fd645eba62d <Имя вируса>.exe 1.exe
- '%TEMP%\<Имя вируса>.exe'
- '<SYSTEM32>\wscp.exe' <SYSTEM32>\srservice.vbs
- %TEMP%\<Имя вируса>.ini
- %WINDIR%\Temp\DCB58BD0A.sys
- C:\System Volume Information\_restore{E7F0F64C-F7E5-4319-8757-E9A20C1C4E14}\drivetable.txt
- <SYSTEM32>\pandora.pid
- <SYSTEM32>\f9c5d3df84f48502d03492792b27ed95.vbs
- %TEMP%\c728f402185f03b035b81fd645eba62d
- <SYSTEM32>\srservice.exe
- <SYSTEM32>\wscp.exe
- %TEMP%\<Имя вируса>.exe
- <SYSTEM32>\srservice.vbs
- %WINDIR%\Temp\DCB58BD0A.sys
- %TEMP%\c728f402185f03b035b81fd645eba62d
- 'sr.##azoe.cn':80
- 'www.ka###u.bj.cn':80
- sr.##azoe.cn/v3003/s.php?si######################################################################################################
- www.ka###u.bj.cn/v3003/s.php?si######################################################################################################
- DNS ASK sr.##azoe.cn
- DNS ASK www.ka###u.bj.cn
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'